Sciweavers

285 search results - page 8 / 57
» A Systems Engineering Approach to Exception Handling
Sort
View
DELTA
2008
IEEE
13 years 9 months ago
On Using Fingerprint-Sensors for PIN-Pad Entry
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Marcel Jacomet, Josef Goette, Andreas Eicher
ICSE
2004
IEEE-ACM
14 years 7 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda
IWPC
2003
IEEE
14 years 27 days ago
Handling Large Search Space in Pattern-Based Reverse Engineering
Large industrial legacy systems are challenges of reverseengineering activities. Reverse-engineering approaches use text-search tools based on regular expressions or work on prese...
Jörg Niere, Jörg P. Wadsack, Lothar Wend...
PEPM
2009
ACM
14 years 5 days ago
Translation and optimization for a core calculus with exceptions
A requirement of any source language is to be rich in features and concise to use by the programmers. As a drawback, it is often too complex to analyse, causing research studies t...
Cristina David, Cristian Gherghina, Wei-Ngan Chin
ISSTA
2009
ACM
14 years 2 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis