Sciweavers

611 search results - page 99 / 123
» Testing interfaces that do not exist
Sort
View
GI
2010
Springer
14 years 9 months ago
Is it Possible to Interact with a Handheld Device While Holding it in Both Hands?
Abstract: Intuitiveness, attractiveness and efficiency are in general important characteristics of high quality User Interfaces (UI). In the case of a Mass Casualty Incident (MCI)...
Tayfur Coskun, Eva Artinger, Simon Nestler, Amal B...
SIGSOFT
2006
ACM
15 years 11 months ago
Failure proximity: a fault localization-based approach
Recent software systems usually feature an automated failure reporting system, with which a huge number of failing traces are collected every day. In order to prioritize fault dia...
Chao Liu 0001, Jiawei Han
CCS
2007
ACM
15 years 5 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
74
Voted
ACSAC
2004
IEEE
15 years 2 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
BMCBI
2008
146views more  BMCBI 2008»
14 years 11 months ago
Can molecular dynamics simulations help in discriminating correct from erroneous protein 3D models?
Background: Recent approaches for predicting the three-dimensional (3D) structure of proteins such as de novo or fold recognition methods mostly rely on simplified energy potentia...
Jean-François Taly, Antoine Marin, Jean-Fra...