Sciweavers

674 search results - page 92 / 135
» The Impact of Service-Oriented Application Development on So...
Sort
View
ACMSE
2008
ACM
13 years 9 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 7 months ago
Audit and Change Analysis of Spreadsheets
Because spreadsheets have a large and growing importance in real-world work, their contents need to be controlled and validated. Generally spreadsheets have been difficult to veri...
John C. Nash, Neil Smith, Andy Adler
SIMUTOOLS
2008
13 years 9 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...