Sciweavers

RFIDSEC
2010
15 years 23 days ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
98
Voted
PROVSEC
2010
Springer
15 years 23 days ago
A Calculus for Game-Based Security Proofs
David Nowak, Yu Zhang
PAISI
2010
Springer
15 years 23 days ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
OOPSLA
2010
Springer
15 years 23 days ago
Almost free concurrency! (using GOF patterns)
We present a framework that provides concurrency-enhanced versions of the GOF object-oriented design patterns. The main benefit of our work is that if programmers improve program...
Sean L. Mooney, Hridesh Rajan, Steven M. Kautz, Wa...
OOPSLA
2010
Springer
15 years 23 days ago
Collaborative model merging
Models are important artifacts in the software development life-cycle and are often the result of a collaborative activity of multiple developers. When multiple developers modify ...
Maximilian Koegel, Helmut Naughton, Jonas Helming,...
OOPSLA
2010
Springer
15 years 23 days ago
Collaboration
Steven Fraser, Hannah Faye Chua, Gail Harris, Orit...
OOPSLA
2010
Springer
15 years 23 days ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...
OOPSLA
2010
Springer
15 years 23 days ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer