Sciweavers

1028 search results - page 77 / 206
» Using Attack Graphs to Design Systems
Sort
View
IWPC
2002
IEEE
14 years 3 months ago
Building Program Understanding Tools Using Visitor Combinators
Program understanding tools manipulate program represensuch as abstract syntax trees, control-flow graphs, or data-flow graphs. This paper deals with the use of visitor combinat...
Arie van Deursen, Joost Visser
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 4 months ago
Perceived Benefits and Concerns of Prospective Users of the SmartCampus Location-Aware Community System Test-bed
The SmartCampus initiative aims to turn an urban university campus into a living laboratory for location aware community system services. To lay a foundation for this effort, the ...
Eunhee Kim, Maria Plummer, Starr Roxanne Hiltz, Qu...
TAOSD
2010
13 years 8 months ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
RTSS
2003
IEEE
14 years 3 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
SOCIALCOM
2010
13 years 8 months ago
On the Navigability of Social Tagging Systems
It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in, for example, the increasing number ...
Denis Helic, Christoph Trattner, Markus Strohmaier...