Soft keyboards offer touch-capable mobile and tabletop devices many advantages such as multiple language support and space for larger graphical displays. On the other hand, becaus...
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
Web services allow authorized entities (including individuals, corporations, and automated agents) to employ software components created by other parties scattered across the glob...
Marcus Fontoura, Tobin J. Lehman, Dwayne Nelson, T...
Graph transformation works under a whole-world assumption. In modelling realistic systems, this typically makes for large graphs and sometimes also large, hard to understand rules....
A widely-distributed network monitoring system requires a scalable discovery mechanism. The “Lookup Service” component of the perfSONAR framework is able to manage component r...
Jason Zurawski, Jeff W. Boote, Eric L. Boyd, Macie...