Sciweavers

545 search results - page 72 / 109
» Computer-Aided Method Engineering: An Analysis of Existing E...
Sort
View
ACSC
2006
IEEE
14 years 2 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
EDBTW
2004
Springer
14 years 1 months ago
The Case for Mobile OLAP
Abstract. On-Line Analytical Processing (OLAP) is a trend in database technology, based on the multidimensional view of data. Numerous applications and development environments exi...
Andreas S. Maniatis
ICSE
2004
IEEE-ACM
14 years 8 months ago
Imposing a Memory Management Discipline on Software Deployment
The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incompl...
Eelco Dolstra, Eelco Visser, Merijn de Jonge
WOSP
2005
ACM
14 years 1 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
AOSE
2007
Springer
14 years 23 hour ago
Refining Goal Models by Evaluating System Behaviour
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...