Sciweavers

19003 search results - page 27 / 3801
» We Need Assurance!
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
AICT
2005
IEEE
146views Communications» more  AICT 2005»
14 years 1 months ago
A Framework for Service Quality Assurance Using Event Correlation Techniques
Due to the increasing use of service level agreements for the provisioning of IT services, providers have to ensure that the guarantees for the quality of their offered services, ...
Andreas Hanemann, Martin Sailer
HAPTICS
2007
IEEE
14 years 2 months ago
Where are we with Haptic Visualization?
There is a growing interest into non-visual forms of data communication, not only driven by the need for accessible representations but also because researchers are realizing the ...
Jonathan C. Roberts, Sabrina A. Panëels
COMPSAC
2004
IEEE
13 years 11 months ago
Cooperative Agent Approach to Quality Assurance and Testing Web Software
This paper applies Lehman's theory of software evolution to analyse the characteristics of web-based applications and identifies the essences and incidents that cause difficu...
Hong Zhu
HASE
2008
IEEE
14 years 2 months ago
Using Multi-Level Security Annotations to Improve Software Assurance
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...
Eryk Kylikowski, Riccardo Scandariato, Wouter Joos...