Sciweavers

2015 search results - page 184 / 403
» Hidden Software Capabilities
Sort
View
118
Voted
EUROSEC
2008
ACM
15 years 4 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
132
Voted
IADIS
2008
15 years 4 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
156
Voted
DAGSTUHL
2009
15 years 3 months ago
Engineering Self-Adaptive Systems through Feedback Loops
To deal with the increasing complexity of software systems and uncertainty of their environments, software engineers have turned to self-adaptivity. Self-adaptive systems are capab...
Yuriy Brun, Giovanna Di Marzo Serugendo, Cristina ...
SIGOPS
2008
120views more  SIGOPS 2008»
15 years 2 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
AI
1999
Springer
15 years 2 months ago
Experiences with an Interactive Museum Tour-Guide Robot
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...