Sciweavers

2015 search results - page 197 / 403
» Hidden Software Capabilities
Sort
View
117
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
126
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Performance Evaluation and Prediction for Legacy Information Systems
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Yan Jin, Antony Tang, Jun Han, Yan Liu
120
Voted
IWPC
2009
IEEE
15 years 9 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
115
Voted
CBSE
2009
Springer
15 years 9 months ago
Selecting Fault Tolerant Styles for Third-Party Components with Model Checking Support
To build highly available or reliable applications out of unreliable third-party components, some software-implemented fault-tolerant mechanisms are introduced to gracefully deal w...
Junguo Li, Xiangping Chen, Gang Huang, Hong Mei, F...
118
Voted
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 9 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen