Sciweavers

1678 search results - page 7 / 336
» An ASM Specification of C
Sort
View
COMPSAC
2005
IEEE
14 years 1 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
ASM
2010
ASM
14 years 4 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
WCE
2007
13 years 8 months ago
Statistical Analysis for Activity-Based Software Estimation using Regression Approach
Application Service Maintenance(ASM) projects mainly use Activity-Based software estimation methodology compared to Function Point or Lines of Code Estimation methodologies[1]. Th...
M. J. Basavaraj, K. C. Shet
JMM2
2006
145views more  JMM2 2006»
13 years 7 months ago
Improved Active Shape Model for Facial Feature Extraction in Color Images
In this paper we present an improved Active Shape Model (ASM) for facial features extraction. The original ASM developed by Cootes et al. [1] suffers from factors such as, poor mod...
Mohammad H. Mahoor, Mohamed Abdel-Mottaleb, A-Nass...
ASM
2008
ASM
13 years 9 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright