Sciweavers

7607 search results - page 1381 / 1522
» informs 2006
Sort
View
139
Voted
ACMSE
2006
ACM
15 years 9 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
128
Voted
AOSD
2006
ACM
15 years 9 months ago
Presenting crosscutting structure with active models
When modifying or debugging a software system, among other tasks, developers must often understand and manipulate source code that crosscuts the system’s structure. These tasks ...
Wesley Coelho, Gail C. Murphy
140
Voted
APGV
2006
ACM
140views Visualization» more  APGV 2006»
15 years 9 months ago
Large displays enhance spatial knowledge of a virtual environment
Previous research has found performance for several egocentric tasks to be superior on physically large displays relative to smaller ones, even when visual angle is held constant....
Jonathan Z. Bakdash, Jason S. Augustyn, Dennis Pro...
96
Voted
ASPDAC
2006
ACM
133views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Crosstalk analysis using reconvergence correlation
Abstract— In the UDSM era, crosstalk is an area of considerable concern for designers, as it can have a considerable impact on the yield, both in terms of functionality and opera...
Sachin Shrivastava, Rajendra Pratap, Harindranath ...
145
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
« Prev « First page 1381 / 1522 Last » Next »