We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
This paper describes the application of an MDA development approach to the Project of Amazon Integration and Cooperation for Modernization of Hydrological Monitoring. This project...
Breno Lisi Romano, Glaucia Braga e Silva, Adilson ...
The Java bytecode language is emerging as a software distribution standard. With major vendors committed to porting the Java run-time environment to their platforms, programs in J...
Cheng-Hsueh A. Hsieh, John C. Gyllenhaal, Wen-mei ...