Sciweavers

5668 search results - page 1064 / 1134
» Overlaps in Requirements Engineering
Sort
View
128
Voted
CCS
2007
ACM
15 years 9 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
135
Voted
CCS
2007
ACM
15 years 9 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
129
Voted
EDUTAINMENT
2007
Springer
15 years 9 months ago
Teaching Structured Development of Virtual Reality Systems Using P-VoT
Learning to build and test virtual reality (VR) systems is difficult due to the many required knowledge (e.g. computer graphics, sound processing, simulation, interaction, etc.) an...
Jinseok Seo, Gerard Jounghyun Kim
137
Voted
EMSOFT
2007
Springer
15 years 9 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
124
Voted
EMSOFT
2007
Springer
15 years 9 months ago
A dynamic scheduling approach to designing flexible safety-critical systems
The design of safety-critical systems has typically adopted static techniques to simplify error detection and fault tolerance. However, economic pressure to reduce costs is exposi...
Luís Almeida, Sebastian Fischmeister, Madhu...
« Prev « First page 1064 / 1134 Last » Next »