Sciweavers

1412 search results - page 175 / 283
» The Value of Outsourced Software
Sort
View
SRDS
2003
IEEE
14 years 3 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
IUI
2003
ACM
14 years 3 months ago
MovieLens unplugged: experiences with an occasionally connected recommender system
Recommender systems have changed the way people shop online. Recommender systems on wireless mobile devices may have the same impact on the way people shop in stores. We present o...
Bradley N. Miller, Istvan Albert, Shyong K. Lam, J...
IUI
2003
ACM
14 years 3 months ago
An experiment in automated humorous output production
Computational humor will be needed in interfaces, no less than other cognitive capabilities. There are many practical settings where computational humor will add value. Among them...
Oliviero Stock, Carlo Strapparava
PPPJ
2003
ACM
14 years 3 months ago
A new approach for implementing stand-alone and Web-based interpreters for Java
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning Java is hampered by the fact that to get even th...
Stephan Diehl, Claudia Bieg
KBSE
2002
IEEE
14 years 3 months ago
SeDiTeC - Testing Based on Sequence Diagrams
In this paper we present a concept for automated testing of object-oriented applications and a tool called SeDiTeC that implements these concepts for Java applications. SeDiTeC us...
Falk Fraikin, Thomas Leonhardt