Sciweavers

3011 search results - page 260 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
PLDI
2009
ACM
14 years 10 months ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
14 years 1 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ITNG
2006
IEEE
14 years 3 months ago
Rethinking Programming
The accepted view of programming, rooted in Turing’s fundamental characterization of algorithms, has had a profound impact on the theory and practice of computing with yet broad...
W. M. Beynon, R. C. Boyatt, S. B. Russ
ICWE
2005
Springer
14 years 2 months ago
MDA Transformations Applied to Web Application Development
Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final imple...
Santiago Meliá, Andreas Kraus, Nora Koch