Sciweavers

443 search results - page 76 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
CSMR
2006
IEEE
14 years 1 months ago
Regaining Lost Knowledge through Dynamic Analysis and Aspect Orientation
This paper describes our experiences of applying dynamic analysis solutions on an industrial legacy application written in C, with the help of Aspect Orientation (AO). We use a nu...
Andy Zaidman, Serge Demeyer, Bram Adams, Kris De S...
CHI
1999
ACM
13 years 12 months ago
Interactive 3D Sound Hyperstories for Blind Children
Interactive software is currently used for learning and entertainment purposes. This type of software is not very common among blind children because most computer games and elect...
Mauricio Lumbreras, Jaime Sánchez
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
AVI
2008
13 years 10 months ago
Evaluation of pointing performance on screen edges
Pointing on screen edges is a frequent task in our everyday use of computers. Screen edges can help stop cursor movements, requiring less precise movements from the user. Thus, po...
Caroline Appert, Olivier Chapuis, Michel Beaudouin...
DIMVA
2008
13 years 9 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...