Sciweavers

99 search results - page 12 / 20
» Investigating and improving a COTS-based software developmen...
Sort
View
ICON
2007
IEEE
14 years 2 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
LREC
2010
138views Education» more  LREC 2010»
13 years 9 months ago
Human Language Technology and Communicative Disabilities: Requirements and Possibilities for the Future
For some years now, the Nederlandse Taalunie (Dutch Language Union) has been active in promoting the development of human language technology (HLT) applications for users of Dutch...
Marina B. Ruiter, Toni C. M. Rietveld, Catia Cucch...
VMCAI
2009
Springer
14 years 3 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
ICWN
2004
13 years 9 months ago
Energy-Efficient Graphical User Interface Design
Mobile computers, such as cell phones and personal digital assistants (PDAs), have dramatically increased in sophistication. At the same time, the desire of consumers for portabili...
Keith S. Vallerio, Lin Zhong, Niraj K. Jha
CCGRID
2001
IEEE
14 years 1 days ago
Performance Evaluation of an Agent-Based Resource Management Infrastructure for Grid Computing
Resource management is an important infrastructure in the grid computing environment. Scalability and adaptability are two key challenges in the implementation of such complex sof...
Junwei Cao, Darren J. Kerbyson, Graham R. Nudd