Sciweavers

1412 search results - page 168 / 283
» Experience Prototyping
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
CHI
2009
ACM
14 years 8 months ago
Finding causes of program output with the Java Whyline
Debugging and diagnostic tools are some of the most important software development tools, but most expect developers choose the right code to inspect. Unfortunately, this rarely o...
Andrew Jensen Ko, Brad A. Myers
SIGMOD
2002
ACM
124views Database» more  SIGMOD 2002»
14 years 8 months ago
Middle-tier database caching for e-business
Scaling up to the enormous and growing Internet population with unpredictable usage patterns, Ecommerce applications face severe challenges in cost and manageability, especially f...
Qiong Luo, Sailesh Krishnamurthy, C. Mohan, Hamid ...
ICDCS
2009
IEEE
14 years 5 months ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
SAC
2010
ACM
14 years 3 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin