Sciweavers

2213 search results - page 286 / 443
» Software Security
Sort
View
127
Voted
TASE
2008
IEEE
15 years 3 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
105
Voted
AC
2004
Springer
15 years 3 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
129
Voted
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 6 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
108
Voted
FOSAD
2007
Springer
15 years 9 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
OOPSLA
2007
Springer
15 years 9 months ago
CUTE: C++ unit testing easier
This article describes the design and use of the CUTE C++ testing framework and its integration into the Eclipse C++ Development Tooling. Unit testing supports code quality and is...
Peter Sommerlad, Emanuel Graf