Sciweavers

ECLIPSE
2007
ACM
13 years 12 months ago
Porting a distributed meeting system to the Eclipse communication framework
eConference is a text-based conferencing tool that supports distributed teams in need for synchronous communication and structured discussion services. Other than offering communi...
Fabio Calefato, Filippo Lanubile, Mario Scalas
ECLIPSE
2007
ACM
13 years 12 months ago
Building, deploying, and monitoring distributed applications with Eclipse and R-OSGI
Designing and testing distributed applications is still a difficult task that requires in-depth knowledge about networking issues. Eclipse is, among other things, a powerful and w...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
ECLIPSE
2007
ACM
13 years 12 months ago
Informing Eclipse API production and consumption
Application programming interfaces (APIs) inform application developers as to the functionality provided by a library and how to interact with it. APIs are a double-edged sword: i...
Reid Holmes, Robert J. Walker
COMPSAC
2009
IEEE
13 years 12 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
COMPSAC
2009
IEEE
13 years 12 months ago
Towards a Unified Behavioral Model for Component-Based and Service-Oriented Systems
There is no clear distinction between service-oriented systems (SOS) and component-based systems (CBS). However, there are several characteristics that could let one consider SOS ...
Aida Causevic, Aneta Vulgarakis
COMPSAC
2009
IEEE
13 years 12 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
COMPSAC
2009
IEEE
13 years 12 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
COMPSAC
2009
IEEE
13 years 12 months ago
Hot Set Identification for Social Network Applications
Several operations of Web-based applications are optimized with respect to the set of resources that will receive the majority of requests in the near future, namely the hot set. U...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
COMPSAC
2009
IEEE
13 years 12 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
CODES
2009
IEEE
13 years 12 months ago
TotalProf: a fast and accurate retargetable source code profiler
Profilers play an important role in software/hardware design, optimization, and verification. Various approaches have been proposed to implement profilers. The most widespread app...
Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers...