Sciweavers

341 search results - page 23 / 69
» A Security Engineering Process based on Patterns
Sort
View
ER
1997
Springer
148views Database» more  ER 1997»
15 years 6 months ago
Intelligent Support for Retrieval and Synthesis of Patterns for Object-Oriented Design
Several decades of software engineering research confirm that effective reuse is the only realistic approach to meeting the ever-increasing demands on the software industry. Over ...
Sandeep Purao, Veda C. Storey
FPGA
2006
ACM
117views FPGA» more  FPGA 2006»
15 years 6 months ago
Context-free-grammar based token tagger in reconfigurable devices
In this paper, we present reconfigurable hardware architecture for detecting semantics of streaming data on 1+ Gbps networks. The design leverages on the characteristics of contex...
Young H. Cho, James Moscola, John W. Lockwood
AOSD
2010
ACM
15 years 9 months ago
Tracking code patterns over multiple software versions with Herodotos
An important element of understanding a software code base is to identify the repetitive patterns of code it contains and how these evolve over time. Some patterns are useful to t...
Nicolas Palix, Julia L. Lawall, Gilles Muller
SIGOPSE
1998
ACM
15 years 6 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
SEW
2007
IEEE
15 years 8 months ago
Testing Patterns
: After over a decade of use, design patterns continue to find new areas of application. In previous work, we presented a contract formalism for specifying patterns precisely, and...
Neelam Soundarajan, Jason O. Hallstrom, Adem Delib...