Sciweavers

6555 search results - page 1203 / 1311
» Secure attribute-based systems
Sort
View
ISSRE
2006
IEEE
15 years 8 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
NDSS
2006
IEEE
15 years 8 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
ASSETS
2006
ACM
15 years 8 months ago
Wireless headset communications for vision impaired persons in multi-User environments
Wireless headsets are a great asset to Vision Impaired Persons (VIP’s) as they prove to be much easier to use and reliable than wired equivalents. Radio based wireless headsets ...
Iain Murray, Andrew Pasquale
ISSTA
2006
ACM
15 years 8 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
« Prev « First page 1203 / 1311 Last » Next »