Sciweavers

7366 search results - page 1338 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 10 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
KBSE
2005
IEEE
15 years 10 months ago
On dynamic feature location
Feature location aims at locating pieces of code that implement a given set of features (requirements). It is a necessary first step in every program comprehension and maintenanc...
Rainer Koschke, Jochen Quante
CAISE
2005
Springer
15 years 10 months ago
Capitalizing on Awareness of User Tasks for Guiding Self-Adaptation
Abstract. Computers support more and more tasks in the personal and professional activities of users. Such user tasks increasingly span large periods of time and many locations acr...
João Pedro Sousa, Vahe Poladian, David Garl...
DILS
2005
Springer
15 years 10 months ago
BioNavigation: Selecting Optimum Paths Through Biological Resources to Evaluate Ontological Navigational Queries
Publicly available biological resources form a complex maze of highly heterogeneous data sources, interconnected by navigational capabilities and applications. Although it offers ...
Zoé Lacroix, Kaushal Parekh, Maria-Esther V...
IH
2005
Springer
15 years 10 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
« Prev « First page 1338 / 1474 Last » Next »