Sciweavers

5439 search results - page 1004 / 1088
» Patterns: from system design to software testing
Sort
View
115
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 9 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
132
Voted
EDOC
2007
IEEE
15 years 9 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
128
Voted
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 9 months ago
A Policy for Open-Loop Attenuation of Disturbance Effects Caused by Uncertain Ground Properties in Running
— Outside of the laboratory, accurate models of ground impact dynamics are either difficult or impossible to obtain. Instead, a rigid ground model is often used in gait and cont...
Jonathan W. Hurst, Benjamin Morris, Joel E. Chestn...
149
Voted
CIKM
2007
Springer
15 years 9 months ago
Optimizing parallel itineraries for knn query processing in wireless sensor networks
Spatial queries for extracting data from wireless sensor networks are important for many applications, such as environmental monitoring and military surveillance. One such query i...
Tao-Young Fu, Wen-Chih Peng, Wang-Chien Lee
114
Voted
MODELS
2007
Springer
15 years 9 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
« Prev « First page 1004 / 1088 Last » Next »