Sciweavers

789 search results - page 128 / 158
» Measurement Programs in Software Development: Determinants o...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
SIGSOFT
2004
ACM
14 years 8 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
CHI
2009
ACM
14 years 8 months ago
Using strokes as command shortcuts: cognitive benefits and toolkit support
This paper investigates using stroke gestures as shortcuts to menu selection. We first experimentally measured the performance and ease of learning of stroke shortcuts in comparis...
Caroline Appert, Shumin Zhai
LREC
2008
124views Education» more  LREC 2008»
13 years 9 months ago
Integrating Audio and Visual Information for Modelling Communicative Behaviours Perceived as Different
In human face-to-face interaction, participants can rely on a number of audio-visual information for interpreting interlocutors' communicative intentions, such information st...
Michelina Savino, Laura Scivetti, Mario Refice
CN
1999
128views more  CN 1999»
13 years 7 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer