Sciweavers

341 search results - page 38 / 69
» A Security Engineering Process based on Patterns
Sort
View
ICRA
2005
IEEE
108views Robotics» more  ICRA 2005»
15 years 8 months ago
Motion Emergency of Humanoid Robots by an Attractor Design of a Nonlinear Dynamics
— The human motions are generated through the interaction between the body and its environments. The information processing system defines the current motion using the signal fe...
Masafumi Okada, Kenta Osato, Yoshihiko Nakamura
OOPSLA
2005
Springer
15 years 8 months ago
Language constructs for improving reusability in object-oriented software
The objective of this research project is to improve the reusability of object-oriented software. We have introduced anchored exception declarations to allow checked exceptions to...
Marko van Dooren, Eric Steegmans
138
Voted
WISTP
2010
Springer
15 years 9 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
SIGSOFT
2006
ACM
15 years 8 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
WOSP
2010
ACM
15 years 6 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...