Sciweavers

593 search results - page 52 / 119
» tools 2011
Sort
View
ICDE
2011
IEEE
241views Database» more  ICDE 2011»
14 years 7 months ago
Advanced search, visualization and tagging of sensor metadata
— As sensors continue to proliferate, the capabilities of effectively querying not only sensor data but also its metadata becomes important in a wide range of applications. This ...
Ioannis K. Paparrizos, Hoyoung Jeung, Karl Aberer
ICST
2011
IEEE
14 years 7 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 7 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
CHI
2011
ACM
14 years 7 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
CHI
2011
ACM
14 years 7 months ago
Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children's technology
There is a wealth of theoretical knowledge about the developmental abilities and skills of children. However, this knowledge is not readily accessible to designers of interactive ...
Tilde Bekker, Alissa Nicole Antle