Sciweavers

1168 search results - page 90 / 234
» Influencing Software Usage
Sort
View
ICPR
2010
IEEE
14 years 13 days ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
IWPC
2007
IEEE
14 years 3 months ago
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views
The use of dynamic information to aid in software understanding is a common practice nowadays. One of the many approaches concerns the comprehension of execution traces. A major i...
Bas Cornelissen, Danny Holten, Andy Zaidman, Leon ...
IWPC
2006
IEEE
14 years 3 months ago
Improving Comprehensibility of Source Code via Traceability Information: a Controlled Experiment
The presence of traceability links between software artefacts is very important to achieve high comprehensibility and maintainability. This is confirmed by several researches and ...
Andrea De Lucia, Rocco Oliveto, Francesco Zurolo, ...
CBSE
2004
Springer
14 years 2 months ago
Introducing a Component Technology for Safety Critical Embedded Real-Time Systems
Safety critical embedded real-time systems represent a class of systems that has attracted relatively little attention in research addressing component based software engineering. ...
Kristian Sandström, Johan Fredriksson, Mikael...