Sciweavers

419 search results - page 46 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
VLSID
2003
IEEE
147views VLSI» more  VLSID 2003»
14 years 8 months ago
SoC Synthesis with Automatic Hardware Software Interface Generation
Design of efficient System-on-Chips (SoCs) require thorough application analysis to identify various compute intensive parts. These compute intensive parts can be mapped to hardwa...
Amarjeet Singh 0002, Amit Chhabra, Anup Gangwar, B...
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
CHI
2008
ACM
14 years 8 months ago
Evaluation of a role-based approach for customizing a complex development environment
Coarse-grained approaches to customization allow the user to enable or disable groups of features at once, rather than individual features. While this may reduce the complexity of...
Leah Findlater, Joanna McGrenere, David Modjeska
ACE
2004
315views Education» more  ACE 2004»
13 years 9 months ago
Applying SPICE to e-Learning: An e-Learning Maturity Model?
The Capability Maturity Model and SPICE approach to software process improvement has resulted in a robust system for improving development process capability in the field of softw...
Stephen Marshall, Geoff Mitchell
GIS
2007
ACM
14 years 8 months ago
Evacuation route planning: scalable heuristics
Given a transportation network, a vulnerable population, and a set of destinations, evacuation route planning identifies routes to minimize the time to evacuate the vulnerable pop...
Sangho Kim, Betsy George, Shashi Shekhar