Sciweavers

286 search results - page 44 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
IWPC
2006
IEEE
14 years 1 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea
COMPSAC
2005
IEEE
14 years 1 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
VISSOFT
2005
IEEE
14 years 1 months ago
Fractal Figures: Visualizing Development Effort for CVS Entities
Versioning systems such as CVS or Subversion exhibit a large potential to investigate the evolution of software systems. They are used to record the development steps of software ...
Marco D'Ambros, Michele Lanza, Harald Gall
ISSTA
2004
ACM
14 years 1 months ago
Automating commutativity analysis at the design level
Two operations commute if executing them serially in either order results in the same change of state. In a system in which commands may be issued simultaneously by different use...
Greg Dennis, Robert Seater, Derek Rayside, Daniel ...
ADAEUROPE
2004
Springer
14 years 1 months ago
High-Integrity Interfacing to Programmable Logic with Ada
Abstract. Programmable logic devices (PLDs) are now common components of safety-critical systems, and are increasingly used for safetyrelated or safety-critical functionality. Rece...
Adrian J. Hilton, Jon G. Hall