Sciweavers

2015 search results - page 123 / 403
» Hidden Software Capabilities
Sort
View
UIST
2009
ACM
14 years 3 months ago
Mining web interactions to automatically create mash-ups
The deep web contains an order of magnitude more information than the surface web, but that information is hidden behind the web forms of a large number of web sites. Metasearch e...
Jeffrey P. Bigham, Ryan S. Kaminsky, Jeffrey Nicho...
ICST
2008
IEEE
14 years 3 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
ISPASS
2007
IEEE
14 years 3 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
ERLANG
2006
ACM
14 years 3 months ago
Dryverl: a flexible Erlang/C binding compiler
This article introduces Dryverl, an Erlang/C binding code r. Dryverl aims at becoming the most abstract, open and efficient tool for implementing any Erlang/C bindings, as either...
Romain Lenglet, Shigeru Chiba
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu