Sciweavers

2015 search results - page 198 / 403
» Hidden Software Capabilities
Sort
View
111
Voted
UIST
2009
ACM
15 years 9 months ago
Mouse 2.0: multi-touch meets the mouse
In this paper we present novel input devices that combine the standard capabilities of a computer mouse with multitouch sensing. Our goal is to enrich traditional pointerbased des...
Nicolas Villar, Shahram Izadi, Dan Rosenfeld, Hrvo...
113
Voted
ICST
2008
IEEE
15 years 9 months ago
An Evaluation of Two Bug Pattern Tools for Java
Automated static analysis is a promising technique to detect defects in software. However, although considerable effort has been spent for developing sophisticated detection possi...
Stefan Wagner, Florian Deissenboeck, Michael Aichn...
103
Voted
KBSE
2008
IEEE
15 years 9 months ago
Self-healing strategies for component integration faults
Software systems increasingly integrate Off-The-Shelf (OTS) components. However, due to the lack of knowledge about the reused OTS components, this integration is fragile and can ...
Hervé Chang, Leonardo Mariani, Mauro Pezz&e...
118
Voted
ACSAC
2007
IEEE
15 years 9 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
110
Voted
CGO
2007
IEEE
15 years 9 months ago
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
The demand for high performance has driven acyclic computation accelerators into extensive use in modern embedded and desktop architectures. Accelerators that are ideal from a sof...
Amir Hormati, Nathan Clark, Scott A. Mahlke