Sciweavers

283 search results - page 29 / 57
» Software Inspections We Can Trust
Sort
View
WCRE
1993
IEEE
15 years 4 months ago
Flexible Control for Program Recognition
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Linda M. Wills
ISESE
2006
IEEE
15 years 5 months ago
An empirical study of developers views on software reuse in statoil ASA
In this article, we describe the results from our survey in the ITdepartment of a large Oil and Gas company in Norway (Statoil ASA), in order to characterize developers’ views o...
Odd Petter N. Slyngstad, Anita Gupta, Reidar Conra...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 5 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
IH
1998
Springer
15 years 4 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
ATAL
2003
Springer
15 years 5 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings