Sciweavers

1448 search results - page 154 / 290
» From Requirements to Code Revisited
Sort
View
CBSE
2009
Springer
15 years 8 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
ESSOS
2009
Springer
15 years 8 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
CCS
2001
ACM
15 years 8 months ago
Error-tolerant password recovery
Many encryption systems require the user to memorize high entropy passwords or passphrases and reproduce them exactly. This is often a difficult task. We propose a more fault-tole...
Niklas Frykholm, Ari Juels
CSMR
2000
IEEE
15 years 8 months ago
Towards a Quantitative Assessment of Method Replacement
Object-oriented programming is about the creation of reusable classes that are to be extended to capture the specific requirements of the application at hand. However, instead of...
Rudolf K. Keller, Reinhard Schauer
135
Voted
SIGOPSE
2000
ACM
15 years 8 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski