Sciweavers

2513 search results - page 90 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ASSETS
2010
ACM
13 years 5 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
CSMR
2006
IEEE
14 years 4 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 10 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
ISSTA
2004
ACM
14 years 3 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Software Component Models and Services in Embedded Real-Time Systems
While the use of software component models has become popular in the development of desktop applications and distributed information systems, such models have not been widely used...
Frank Lüders, Shoaib Ahmad, Faisal Khizer, Gu...