Sciweavers

3792 search results - page 94 / 759
» Techniques for Trusted Software Engineering
Sort
View
COMPSAC
2003
IEEE
15 years 8 months ago
Scalable Multilateral Communication Technique for Large-Scale Information Systems
Autonomous Community Information System (ACIS) is a proposition made to contend with the extreme dynamism in the large-scale information system. ACIS is a decentralized bilateral-...
Khaled Ragab, Naohiro Kaji, Koichi Moriyama, Kinji...
133
Voted
UIST
2000
ACM
15 years 8 months ago
Sensing techniques for mobile interaction
We describe sensing techniques motivated by unique aspects of human-computer interaction with handheld devices in mobile settings. Special features of mobile interaction include c...
Ken Hinckley, Jeffrey S. Pierce, Mike Sinclair, Er...
120
Voted
WISA
2005
Springer
15 years 9 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
112
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
An Experimental Framework for Testing Web Prefetching Techniques
The popularity of web objects, and by extension the popularity of the web sites, besides the appearance of clear footprints in user's accesses that show a considerable spatia...
Josep Domènech, Ana Pont, Julio Sahuquillo,...
117
Voted
CSMR
1999
IEEE
15 years 7 months ago
A Software Defect Report and Tracking System in an Intranet
This paper describes a case study where SofTrack a Software Defect Report and Tracking System - was implemented using internet technology in a geographically distributed organizat...
António Silva Monteiro, Miguel Goulã...