Sciweavers

2251 search results - page 311 / 451
» Specification and Implementation Problems for C
Sort
View
ICSE
2008
IEEE-ACM
16 years 5 months ago
Promoting developer-specific awareness
Maintaining a developer's awareness of changes in the software on which she depends is challenging. Awareness is often impeded at two ends of the spectrum: a lack of informat...
Reid Holmes, Robert J. Walker
ESOP
2010
Springer
16 years 2 months ago
Precise and Automated Contract-based Reasoning for Verification and Certification of Information Flow Properties of Programs wit
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
Torben Amtoft, John Hatcliff and Edwin Rodríguez
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 11 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 11 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
AIME
2007
Springer
15 years 11 months ago
Using Semantic Web Technologies for Knowledge-Driven Querying of Biomedical Data
Software applications that work with biomedical data have significant knowledge-management requirements. Formal knowledge models and knowledge-based methods can be very useful in m...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...