Sciweavers

801 search results - page 9 / 161
» Robust Nonproprietary Software
Sort
View
IH
2007
Springer
15 years 3 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
COMPSAC
2009
IEEE
15 years 2 months ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
SOSP
2001
ACM
15 years 6 months ago
Building a Robust Software-Based Router Using Network Processors
Recent efforts to add new services to the Internet have increased interest in software-based routers that are easy to extend and evolve. This paper describes our experiences using...
Tammo Spalink, Scott Karlin, Larry L. Peterson, Yi...
ECOOP
2006
Springer
15 years 1 months ago
Design-Based Pointcuts Robustness Against Software Evolution
Aspect-Oriented Programming (AOP) is a powerful technique to better modularize object-oriented programs by introducing crosscutting concerns in a safe and noninvasive way. Unfortu...
Walter Cazzola, Sonia Pini, Massimo Ancona
SPAA
2010
ACM
15 years 2 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear