Sciweavers

1136 search results - page 211 / 228
» Case Study of Object-Oriented Software Development
Sort
View
ERSHOV
2003
Springer
14 years 23 days ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
DAC
2007
ACM
13 years 11 months ago
Design for Verification in System-level Models and RTL
It has long been the practice to create models in C or C++ for architectural studies, software prototyping and RTL verification in the design of Systems-on-Chip (SoC). It is often...
Anmol Mathur, Venkat Krishnaswamy
ER
2007
Springer
102views Database» more  ER 2007»
13 years 11 months ago
Relational Data Tailoring Through View Composition
This paper presents a methodology to derive views over a relational database by applying a sequence of appropriately defined operations to the global schema. Such tailoring and com...
Cristiana Bolchini, Elisa Quintarelli, Rosalba Ros...
GROUP
2007
ACM
13 years 11 months ago
Identity management: multiple presentations of self in facebook
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This researc...
Joan Morris DiMicco, David R. Millen
COOPIS
2004
IEEE
13 years 11 months ago
TRAP/J: Transparent Generation of Adaptable Java Programs
This paper describes TRAP/J, a software tool that enables new adaptable behavior to be added to existing Java applications transparently (that is, without modifying the application...
Seyed Masoud Sadjadi, Philip K. McKinley, Betty H....