Sciweavers

148 search results - page 16 / 30
» Soft-Error Detection through Software Fault-Tolerance Techni...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
UIST
1995
ACM
13 years 11 months ago
The World Through the Computer: Computer Augmented Interaction with Real World Environments
Current user interface techniques such as WIMP or the desktop metaphor do not support real world tasks, because the focus of these user interfaces is only on human–computer inte...
Jun Rekimoto, Katashi Nagao
ACSAC
2005
IEEE
14 years 1 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
COMPSAC
1999
IEEE
14 years 1 days ago
Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates
Design patterns have been used in object-oriented frameworks such as the IBM San Francisco framework, Apple's Rhaspody, OpenStep, and WebObjects, and DIWB. However, few guide...
Wei-Tek Tsai, Yongzhong Tu, Weiguang Shao, Ezra Eb...
KBSE
2008
IEEE
14 years 2 months ago
Reducing the Cost of Path Property Monitoring Through Sampling
Run-time monitoring can provide important insights about a program’s behavior and, for simple properties, it can be done efficiently. Monitoring properties describing sequences...
Matthew B. Dwyer, Madeline Diep, Sebastian G. Elba...