Sciweavers

2056 search results - page 210 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
WORM
2003
15 years 6 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ISORC
2003
IEEE
15 years 10 months ago
Design of SMIL Browser Functionality in Mobile Terminals
SMIL is a markup language which enables us to describe multimedia contents. This paper proposes a design model of SMIL browser functionality for mobile terminals whose resources a...
Satoshi Hieda, Yoshinori Saida, Hiroshi Chishima, ...
CHI
1993
ACM
15 years 8 months ago
A design space for multimodal systems: concurrent processing and data fusion
Multimodal interaction enables the user to employ different modalities such as voice, gesture and typing for communicating with a computer. This paper presents an analysis of the ...
Laurence Nigay, Joëlle Coutaz
MIDDLEWARE
2005
Springer
15 years 10 months ago
Sensor bean: a component platform for sensor-based services
Sensor-based services propose to gather, manage, analyze, access and react to sensor data. These services are distributed over heterogeneous platforms. The complexity of the imple...
Cristina Marin, Mikael Desertot
120
Voted
SIGSOFT
2010
ACM
15 years 2 months ago
Managing technical debt in software-reliant systems
Delivering increasingly complex software-reliant systems demands better ways to manage the long-term effects of shortterm expedients. The technical debt metaphor is gaining signif...
Nanette Brown, Yuanfang Cai, Yuepu Guo, Rick Kazma...