Sciweavers

369 search results - page 61 / 74
» Execution Synthesis: A Technique for Automated Software Debu...
Sort
View
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
DAC
2009
ACM
14 years 8 months ago
Non-intrusive dynamic application profiling for multitasked applications
Application profiling ? the process of monitoring an application to determine the frequency of execution within specific regions ? is an essential step within the design process f...
Karthik Shankar, Roman L. Lysecky
ECAI
2008
Springer
13 years 9 months ago
Incremental Component-Based Construction and Verification of a Robotic System
Abstract-- Autonomous robots are complex systems that require the interaction/cooperation of numerous heterogeneous software components. Nowadays, robots are critical systems and m...
Ananda Basu, Matthieu Gallien, Charles Lesire, Tha...
FPL
2000
Springer
128views Hardware» more  FPL 2000»
13 years 11 months ago
Verification of Dynamically Reconfigurable Logic
This paper reports on a method for extending existing VHDL design and verification software available for the Xilinx Virtex series of FPGAs. It allows the designer to apply standa...
David Robinson, Patrick Lysaght
JCST
2008
114views more  JCST 2008»
13 years 7 months ago
Synthesizing Service Composition Models on the Basis of Temporal Business Rules
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...