Sciweavers

1448 search results - page 148 / 290
» From Requirements to Code Revisited
Sort
View
NDSS
2009
IEEE
15 years 10 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
149
Voted
CAIP
2009
Springer
156views Image Analysis» more  CAIP 2009»
15 years 10 months ago
Bio-inspired Approach for the Recognition of Goal-Directed Hand Actions
The recognition of transitive, goal-directed actions requires a sensible balance between the representation of specific shape details of effector and goal object and robustness w...
Falk Fleischer, Antonino Casile, Martin A. Giese
116
Voted
FM
2009
Springer
171views Formal Methods» more  FM 2009»
15 years 10 months ago
Formal Management of CAD/CAM Processes
Abstract. Systematic engineering design processes have many aspects in common with software engineering, with CAD/CAM objects replacing program code as the implementation stage of ...
Michael Kohlhase, Johannes Lemburg, Lutz Schrö...
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 10 months ago
It's Doomed; We Can Prove It
Abstract. Programming errors found early are the cheapest. Tools applying to the early stage of code development exist but either they suffer from false positives (“noise”) or...
Jochen Hoenicke, K. Rustan M. Leino, Andreas Podel...
140
Voted
ICMT
2009
Springer
15 years 10 months ago
Model Superimposition in Software Product Lines
In software product line engineering, feature composition generates software tailored to specific requirements from a common set of artifacts. Superimposition is a technique to me...
Sven Apel, Florian Janda, Salvador Trujillo, Chris...