Sciweavers

682 search results - page 25 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SCAM
2005
IEEE
14 years 1 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
ISESE
2005
IEEE
14 years 1 months ago
A comparative study on the re-documentation of existing software: code annotations vs. drawing editors
During software evolution, programmers spend a lot of time and effort in the comprehension of the internal code structure. Such an activity is often required because the available...
Marco Torchiano, Filippo Ricca, Paolo Tonella
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
14 years 2 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
JTRES
2010
ACM
13 years 7 months ago
Static checking of safety critical Java annotations
The Safety Critical Java Specification intends to support the development of programs that must be certified. The specification includes a number of annotations used to constrain ...
Daniel Tang, Ales Plsek, Jan Vitek
ASE
2005
102views more  ASE 2005»
13 years 7 months ago
Tool-Supported Verification of Product Line Requirements
A recurring difficulty for organizations that employ a product-line approach to development is that when a new product is added to an existing product line, there is currently no a...
Prasanna Padmanabhan, Robyn R. Lutz