Sciweavers

3667 search results - page 615 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
CHI
2005
ACM
14 years 9 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
HPCA
2005
IEEE
14 years 9 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
CHI
2004
ACM
14 years 9 months ago
EyeDraw: a system for drawing pictures with the eyes
This paper describes the development of EyeDraw, a software system that enables children with severe motor impairments to draw pictures by just moving their eyes. EyeDraw will hel...
Anthony J. Hornof, Anna Cavender, Rob Hoselton
SIGMOD
2009
ACM
218views Database» more  SIGMOD 2009»
14 years 9 months ago
DejaVu: declarative pattern matching over live and archived streams of events
DejaVu is an event processing system that integrates declarative pattern matching over live and archived streams of events on top of a novel system architecture. We propose to dem...
Nihal Dindar, Baris Güç, Patrick Lau, ...
SIGMOD
2005
ACM
157views Database» more  SIGMOD 2005»
14 years 9 months ago
Meta-data version and configuration management in multi-vendor environments
Nearly all components that comprise modern information technology, such as Computer Aided Software Engineering (CASE) tools, Enterprise Application Integration (EAI) environments,...
John R. Friedrich