Sciweavers

238 search results - page 35 / 48
» Modification analysis support at the requirements level
Sort
View
JIPS
2010
138views more  JIPS 2010»
13 years 2 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
ACSAC
2005
IEEE
14 years 1 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
ACSC
2009
IEEE
14 years 2 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ANCS
2005
ACM
14 years 1 months ago
Architectural impact of stateful networking applications
The explosive and robust growth of the Internet owes a lot to the ”end-to-end principle”, which pushes stateful operations to the end-points. The Internet grew both in traffic...
Javier Verdú, Jorge García-Vidal, Ma...
MSR
2005
ACM
14 years 1 months ago
Mining evolution data of a product family
Diversification of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...