Sciweavers

236 search results - page 35 / 48
» Can You Trust Software Capability Evaluations
Sort
View
ASPLOS
2006
ACM
14 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
CGO
2003
IEEE
14 years 1 months ago
Optimal and Efficient Speculation-Based Partial Redundancy Elimination
Existing profile-guided partial redundancy elimination (PRE) methods use speculation to enable the removal of partial redundancies along more frequently executed paths at the expe...
Qiong Cai, Jingling Xue
ICST
2009
IEEE
14 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
AOSD
2003
ACM
14 years 3 months ago
Quantifying aspects in middleware platforms
Middleware technologies such as Web Services, CORBA and DCOM have been very successful in solving distributed computing problems for a large family of application domains. As midd...
Charles Zhang, Hans-Arno Jacobsen
PSYCHNOLOGY
2007
113views more  PSYCHNOLOGY 2007»
13 years 9 months ago
Psychological Implications of Domestic Assistive Technology for the Elderly
The ROBOCARE Domestic Environment (RDE) is the result of a three-year project aimed at developing cognitive support technology for elderly people. Specifically, the domestic envir...
Amedeo Cesta, Gabriella Cortellessa, Vittoria Giul...