Sciweavers

2995 search results - page 531 / 599
» On multi-avoidance of generalized patterns
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 3 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
CODES
2006
IEEE
14 years 3 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
IEEEPACT
2006
IEEE
14 years 3 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...
IMSCCS
2006
IEEE
14 years 3 months ago
Frequency Distribution of TATA Box and Extension Sequences on Human Promoters
Background: TATA box is one of the most important transcription factor binding sites. But the exact sequences of TATA box are still not very clear. Results: In this study, we cond...
Wei Shi, Wanlei Zhou