Sciweavers

249 search results - page 33 / 50
» A secure scan design methodology
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
CCS
2003
ACM
14 years 25 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
14 years 1 months ago
A Pilot Study on Teleoperated Mobile Robots in Home Environments
– Mobile robots operating in home environments must deal with constrained space and a great variety of obstacles and situations to handle. This article presents a pilot study aim...
Daniel Labonte, François Michaud, Patrick B...
OOPSLA
2007
Springer
14 years 1 months ago
Notation and representation in collaborative object-oriented design: an observational study
Software designers in the object-oriented paradigm can make use of modeling tools and standard notations such as UML. Nevertheless, casual observations from collocated design coll...
Uri Dekel, James D. Herbsleb
SIGSOFT
2004
ACM
14 years 8 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde