Sciweavers

304 search results - page 49 / 61
» Safe futures for Java
Sort
View
ISSRE
2002
IEEE
14 years 17 days ago
Fault Contribution Trees for Product Families
Software Fault Tree Analysis (SFTA) provides a structured way to reason about the safety or reliability of a software system. As such, SFTA is widely used in missioncritical appli...
Dingding Lu, Robyn R. Lutz
NDSS
1998
IEEE
13 years 12 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
DSN
2006
IEEE
13 years 11 months ago
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance
This paper presents our experience validating the flood tolerance of two network interface card (NIC)-based embedded firewall solutions, the Embedded Firewall (EFW) and the Autono...
Michael Ihde, William H. Sanders
ICSE
1995
IEEE-ACM
13 years 11 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
HCI
2007
13 years 9 months ago
Situation Awareness and Secondary Task Performance While Driving
For safe driving it is necessary that the drivers perceive the relevant objects of a situation, comprehend the meaning of these objects to form a holistic understanding of the curr...
Martin R. K. Baumann, Diana Rösler, Josef F. ...