Sciweavers

5506 search results - page 962 / 1102
» Visualizing Software Changes
Sort
View
COMSWARE
2007
IEEE
15 years 9 months ago
Real-time End-to-end Network Monitoring in Large Distributed Systems
— Measuring real-time end-to-end network path performance metrics is important for several distributed applications such as media streaming systems (e.g., for switching to paths ...
Han Hee Song, Praveen Yalagandula
DSN
2007
IEEE
15 years 9 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
EDOC
2007
IEEE
15 years 9 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 9 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
15 years 9 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay