Sciweavers

6106 search results - page 1043 / 1222
» Modes for Software Architectures
Sort
View
157
Voted
CGO
2006
IEEE
15 years 9 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
125
Voted
SAC
2006
ACM
15 years 9 months ago
Supporting transparent model update in distributed CASE tool integration
Model Driven Architecture (MDA) is a software development approach that focuses on models. In order to support MDA, a lot of CASE tools have emerged; each of them provides a diffe...
Prawee Sriplakich, Xavier Blanc, Marie-Pierre Gerv...
132
Voted
IUI
2005
ACM
15 years 9 months ago
Intelligent data entry assistant for XML using ensemble learning
XML has emerged as the primary standard of data representation and data exchange [13]. Although many software tools exist to assist the XML implementation process, data must be ma...
Danico Lee, Costas Tsatsoulis
133
Voted
ICICS
2005
Springer
15 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
117
Voted
OTM
2005
Springer
15 years 9 months ago
Accessing X Applications over the World-Wide Web
Abstract. The X Protocol, an asynchronous network protocol, was developed at MIT amid the need to provide a network transparent graphical user interface primarily for the UNIX Oper...
Arno Puder, Siddharth Desai
« Prev « First page 1043 / 1222 Last » Next »