Sciweavers

694 search results - page 105 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
JUCS
2008
210views more  JUCS 2008»
14 years 11 months ago
Systematic Characterisation of Objects in Digital Preservation: The eXtensible Characterisation Languages
: During the last decades, digital objects have become the primary medium to create, shape, and exchange information. However, in contrast to analog objects such as books that dire...
Christoph Becker, Andreas Rauber, Volker Heydegger...
SIGSOFT
2004
ACM
16 years 16 days ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
ICSE
2000
IEEE-ACM
15 years 3 months ago
Galileo: a tool built from mass-market applications
We present Galileo, an innovative engineering modeling and analysis tool built using an approach we call packageoriented programming (POP). Galileo represents an ongoing evaluatio...
David Coppit, Kevin J. Sullivan
NSDI
2010
15 years 1 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 3 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert