Sciweavers

264 search results - page 8 / 53
» Designing Software Ecosystems: How Can Modeling Techniques H...
Sort
View
WCRE
2005
IEEE
15 years 9 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
KBS
2007
74views more  KBS 2007»
15 years 3 months ago
GUIDE: Games with UML for interactive design exploration
In this paper we present our design tool GUIDE, which allows the user to explore a design in UML interactively by playing a game. The game incorporates both the design model and a...
Jennifer Tenzer, Perdita Stevens
AC
2005
Springer
15 years 3 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
OOPSLA
2007
Springer
15 years 10 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
COMPSAC
2002
IEEE
15 years 9 months ago
A Graphically Based Language for Constructing, Executing and Analysing Models of Software Systems
With computer systems becoming ever larger and more complex, the cost and effort associated with their construction is increasing and the systems are now sufficiently complex that...
Robert John Walters