Sciweavers

411 search results - page 77 / 83
» Controlling Requirements Evolution: An Avionics Case Study
Sort
View
DRM
2005
Springer
14 years 1 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
IJMMS
2008
72views more  IJMMS 2008»
13 years 7 months ago
Zoom interaction design for pen-operated portable devices
Maps are currently the most common application domain for ZUIs. Standard techniques for controlling such interfaces on pen-operated devices usually rely on sequential interaction,...
Thorsten Büring, Jens Gerken, Harald Reiterer
HT
2004
ACM
14 years 1 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...
ANSOFT
2002
94views more  ANSOFT 2002»
13 years 7 months ago
Testing Processes of Web Applications
Abstract. Current practice in Web application development is based on the skills of the individual programmers and often does not apply the principles of software engineering. The ...
Filippo Ricca, Paolo Tonella