Sciweavers

582 search results - page 27 / 117
» Case Study On Social Engineering Techniques for Persuasion
Sort
View
CSMR
2005
IEEE
14 years 2 months ago
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process
Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are e...
Andy Zaidman, Toon Calders, Serge Demeyer, Jan Par...
USS
2008
13 years 10 months ago
Engineering Heap Overflow Exploits with JavaScript
This paper presents a new technique for exploiting heap overflows in JavaScript interpreters. Briefly, given a heap overflow, JavaScript commands can be used to insure that a func...
Mark Daniel, Jake Honoroff, Charlie Miller
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
13 years 8 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
IWPC
2006
IEEE
14 years 2 months ago
Studying the Evolution of Software Systems Using Change Clusters
In this paper, we present an approach that examines the evolution of code stored in source control repositories. The technique identifies Change Clusters, which can help managers...
Jay Kothari, Ali Shokoufandeh, Spiros Mancoridis, ...
JSW
2008
104views more  JSW 2008»
13 years 8 months ago
Testing Software Assets of Framework-Based Product Families During Application Engineering Stage
An application framework provides reusable design and implementation for a family of software systems. At the application engineering stage, application developers extend framework...
Jehad Al-Dallal, Paul G. Sorenson