Sciweavers

591 search results - page 50 / 119
» Securing the Broker Pattern
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
AGENTS
1997
Springer
14 years 28 days ago
Adaptation and Learning in Animated Creatures
This paper is concerned with synthetic agents interacting with virtual environments, called animated creatures. The animated creatures are articulated graphical gures that are eq...
Jiming Liu, Hong Qin, Yuan Yan Tang, Y. T. Wu
OOPSLA
2004
Springer
14 years 2 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 3 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
ANCS
2010
ACM
13 years 6 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao