Sciweavers

416 search results - page 65 / 84
» Some new approaches for preventing software tampering
Sort
View
IUI
2010
ACM
15 years 6 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
TSE
2010
230views more  TSE 2010»
14 years 6 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
PLDI
2012
ACM
13 years 1 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
CC
2005
Springer
153views System Software» more  CC 2005»
15 years 5 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
ERCIMDL
2003
Springer
114views Education» more  ERCIMDL 2003»
15 years 4 months ago
Implementing Preservation Strategies for Complex Multimedia Objects
Addressing the preservation and long-term access issues for digital resources is one of the key challenges facing informational organisations such as libraries, archives, cultural ...
Jane Hunter, Sharmin Choudhury