Sciweavers

427 search results - page 51 / 86
» Improving software security with a C pointer analysis
Sort
View
EMSOFT
2005
Springer
14 years 3 months ago
High performance annotation-aware JVM for Java cards
Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new ...
Ana Azevedo, Arun Kejariwal, Alexander V. Veidenba...
CASCON
2007
1035views Education» more  CASCON 2007»
13 years 12 months ago
An IDE for software development using tabular expressions
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
Dennis K. Peters, Mark Lawford, Baltasar Tranc&oac...
ICSE
1999
IEEE-ACM
14 years 2 months ago
A Language and Environment for Architecture-Based Software Development and Evolution
Software architectures have the potential to substantially improve the development and evolution of large, complex, multi-lingual, multi-platform, long-running systems. However, i...
Nenad Medvidovic, David S. Rosenblum, Richard N. T...
ICS
2007
Tsinghua U.
14 years 4 months ago
Optimization and bottleneck analysis of network block I/O in commodity storage systems
Building commodity networked storage systems is an important architectural trend; Commodity servers hosting a moderate number of consumer-grade disks and interconnected with a hig...
Manolis Marazakis, Vassilis Papaefstathiou, Angelo...
ECOOP
2001
Springer
14 years 2 months ago
Feature Interaction and Composition Problems in Software Product Lines
Features are essential characteristic of applications within a product line. Features organized in different kinds of diagrams containing hierarchies of feature trees are closely ...
Silva Robak, Bogdan Franczyk