Sciweavers

3639 search results - page 519 / 728
» Experiments on IPv6 Testing
Sort
View
ESEM
2007
ACM
14 years 2 months ago
An Empirical Study of the Effects of Gestalt Principles on Diagram Understandability
Comprehension errors in software design must be detected at their origin to avoid propagation into later portions of the software lifecycle and also the final system. This researc...
Krystle Lemon, Edward B. Allen, Jeffrey C. Carver,...
SIGIR
2010
ACM
14 years 2 months ago
Linking wikipedia to the web
We investigate the task of finding links from Wikipedia pages to external web pages. Such external links significantly extend the information in Wikipedia with information from ...
Rianne Kaptein, Pavel Serdyukov, Jaap Kamps
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 2 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
14 years 2 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
DCOSS
2009
Springer
14 years 2 months ago
A Sensor Network System for Measuring Traffic in Short-Term Construction Work Zones
In this paper, we present the design and implementation of a sensor network system for monitoring the flow of traffic through temporary construction work zones. As opposed to long-...
Manohar Bathula, Mehrdad Ramezanali, Ishu Pradhan,...