Sciweavers

5457 search results - page 884 / 1092
» Software Component Independence
Sort
View
ISW
2009
Springer
15 years 11 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
MIDDLEWARE
2009
Springer
15 years 11 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
MODELS
2009
Springer
15 years 11 months ago
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts
Model-based development of highly complex software systems leads to large models. Storing them in repositories offers the possibility to work with these models in a distributed env...
Stefan Jurack, Gabriele Taentzer
PETRA
2009
ACM
15 years 11 months ago
Design and prototype of a device to engage cognitively disabled older adults in visual artwork
We investigate technological solutions for arts therapists who work with older adults with cognitive disabilities, such as Alzheimer’s disease. We present ethnographic analysis ...
Scott Blunsden, Brandi Richards, Jennifer Boger, A...
CISS
2008
IEEE
15 years 10 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng