Sciweavers

1489 search results - page 174 / 298
» The First Bug Report
Sort
View
SAC
2006
ACM
15 years 10 months ago
KALA: Kernel Aspect language for advanced transactions
Transaction management is a known crosscutting concern. Previous research has been conducted to express this concern as an aspect. However, such work has used general-purpose aspe...
Johan Fabry, Theo D'Hondt
SAC
2006
ACM
15 years 10 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
SOUPS
2006
ACM
15 years 10 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ACSAC
2005
IEEE
15 years 10 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
DATE
2005
IEEE
159views Hardware» more  DATE 2005»
15 years 10 months ago
HEBS: Histogram Equalization for Backlight Scaling
- In this paper, a method is presented for finding a pixel transformation function that minimizes the backlight intensity while maintaining a pre-specified image distortion level f...
Ali Iranli, Hanif Fatemi, Massoud Pedram