Sciweavers

103 search results - page 8 / 21
» Microsoft's new window on security
Sort
View
USITS
2001
13 years 11 months ago
Puppeteer: Component-based Adaptation for Mobile Computing
Puppeteer is a system for adapting component-based applications in mobile environments. Puppeteer takes advantage of the exported interfaces of these applications and the structur...
Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
CG
2004
Springer
13 years 9 months ago
User interface development for interactive television: extending a commercial DTV platform to the virtual channel API
We explore the generation of interactive computer graphics at digital set-top boxes in place of the fixed graphics that were embedded to the television video before the broadcast....
Konstantinos Chorianopoulos, Diomidis Spinellis
ISSTA
2009
ACM
14 years 4 months ago
Precise pointer reasoning for dynamic test generation
Dynamic test generation consists of executing a program while gathering symbolic constraints on inputs from predicates encountered in branch statements, and of using a constraint ...
Bassem Elkarablieh, Patrice Godefroid, Michael Y. ...
ACSAC
2008
IEEE
14 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 4 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...