Sciweavers

1860 search results - page 79 / 372
» tools 2009
Sort
View
ICUMT
2009
14 years 10 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
114
Voted
CMSB
2009
Springer
15 years 7 months ago
The Equivalence between Biology and Computation
A major challenge in computational systems biology is the articulation of a biological process in a form which can be understood by the biologist yet is amenable to computational e...
John K. Heath
95
Voted
CHI
2009
ACM
16 years 1 months ago
Aesthetics matter: leveraging design heuristics to synthesize visually satisfying handheld interfaces
We present a tool for automatically generating UI layouts for handheld devices based on design principles. This tool introduces a gestalt approach to visual interface design rathe...
Yeonsoo Yang, Scott R. Klemmer
195
Voted
CC
2009
Springer
132views System Software» more  CC 2009»
16 years 1 months ago
Implementation and Use of Transactional Memory with Dynamic Separation
Abstract. We introduce the design and implementation of dynamic separation (DS) as a programming discipline for using transactional memory. Our approach is based on the programmer ...
Andrew Birrell, Johnson Hsieh, Martín Abadi...
101
Voted
ICSEA
2009
IEEE
15 years 7 months ago
Virtualization Techniques for Cross Platform Automated Software Builds, Tests and Deployment
—In this paper, an integrated approach for cross platform automated software builds and the implementation of a test framework is described. The system introduced here utilizes s...
Thomas Müller, Alois Knoll