Sciweavers

3801 search results - page 204 / 761
» An Approach to Modeling Software Safety
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 4 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
134
Voted
ICSE
2003
IEEE-ACM
16 years 4 months ago
Pattern Oriented Software Development: Moving Seamlessly from Requirements to Architecture
Requirements Engineering (RE) deals with the early phases of software engineering namely requirement elicitation, modeling, specification and validation. Architecture of a softwar...
M. S. Rajasree, P. Jithendra Kumar Reddy, D. Janak...
MSR
2009
ACM
15 years 9 months ago
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code
As more and more open-source software components become available on the internet we need automatic ways to label and compare them. For example, a developer who searches for reusa...
Adrian Kuhn
VAMOS
2010
Springer
15 years 6 months ago
Automating the Configuration of Multi Software Product Lines
The increased use of software product lines (SPLs) results in complex software systems in which products of multiple SPLs communicate and interact with each other. Such a system of...
Marko Rosenmüller, Norbert Siegmund
SOCO
2008
Springer
15 years 4 months ago
Software development with imperfect information
Delivering software systems that fulfill all requirements of the stakeholders is very difficult, if not at all impossible. We consider the problem of coping with imperfect informat...
Joost Noppen, Pim van den Broek, Mehmet Aksit