Sciweavers

1636 search results - page 49 / 328
» Detecting similar software applications
Sort
View
SIGSAND
2008
13 years 10 months ago
Relational Model Driven Application Design
Abstract: A closer look at typical information systems shows that relatively simple routines often contribute significantly to the overall expenses of the software development proc...
Michael Guckert, René Gerlach
ICMCS
2005
IEEE
141views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Events Detection for an Audio-Based Surveillance System
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems ai...
Chloé Clavel, Thibaut Ehrette, Gaël Ri...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
14 years 3 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...
ATAL
2010
Springer
13 years 9 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
ACSAC
2005
IEEE
14 years 2 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...