Sciweavers

222 search results - page 27 / 45
» Development of Correct Graph Transformation Systems
Sort
View
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
PAM
2010
Springer
14 years 2 months ago
Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers
Abstract. To describe, analyze, and model the topological and structural characteristics of the Internet, researchers use Internet maps constructed at the router or autonomous syst...
Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov...
AGTIVE
2007
Springer
13 years 11 months ago
Generating Domain-Specific Model Editors with Complex Editing Commands
Abstract. Domain specific modeling languages are of increasing importance for the development of software and other systems. Meta tools are needed to support rapid development of d...
Gabriele Taentzer, André Crema, René...
ANTSW
2010
Springer
13 years 5 months ago
Functional Blueprints: An Approach to Modularity in Grown Systems
Abstract. The engineering of grown systems poses fundamentally different system integration challenges than ordinary engineering of static designs. On the one hand, a grown system ...
Jacob Beal
METRICS
2002
IEEE
14 years 13 days ago
Gemini: Maintenance Support Environment Based on Code Clone Analysis
Maintaining software systems is getting more complex and difficult task, as the scale becomes larger. It is generally said that code clone is one of the factors that make softwar...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...