Sciweavers

766 search results - page 35 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ICSM
2005
IEEE
14 years 1 months ago
Incremental Maintenance of Software Artifacts
We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Steven P. Reiss
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CSREASAM
2006
13 years 9 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
ITNG
2010
IEEE
13 years 9 months ago
Applying MDA Development Approach to a Hydrological Project
This paper describes the application of an MDA development approach to the Project of Amazon Integration and Cooperation for Modernization of Hydrological Monitoring. This project...
Breno Lisi Romano, Glaucia Braga e Silva, Adilson ...
MICRO
1996
IEEE
173views Hardware» more  MICRO 1996»
13 years 12 months ago
Java Bytecode to Native Code Translation: The Caffeine Prototype and Preliminary Results
The Java bytecode language is emerging as a software distribution standard. With major vendors committed to porting the Java run-time environment to their platforms, programs in J...
Cheng-Hsueh A. Hsieh, John C. Gyllenhaal, Wen-mei ...