Sciweavers

260 search results - page 49 / 52
» Risk and Requirements-Based Testing
Sort
View
ASPLOS
2009
ACM
14 years 2 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
DIM
2007
ACM
14 years 2 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
14 years 2 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
ICSE
2000
IEEE-ACM
14 years 2 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
CIVR
2008
Springer
245views Image Analysis» more  CIVR 2008»
14 years 20 days ago
Probabilistic optimized ranking for multimedia semantic concept detection via RVM
We present a probabilistic ranking-driven classifier for the detection of video semantic concept, such as airplane, building, etc. Most existing concept detection systems utilize ...
Yantao Zheng, Shi-Yong Neo, Tat-Seng Chua, Qi Tian