Sciweavers

682 search results - page 60 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
BMCBI
2007
179views more  BMCBI 2007»
13 years 7 months ago
Automated smoother for the numerical decoupling of dynamics models
Background: Structure identification of dynamic models for complex biological systems is the cornerstone of their reverse engineering. Biochemical Systems Theory (BST) offers a pa...
Marco Vilela, Carlos Cristiano H. Borges, Susana V...
SOCO
2008
Springer
13 years 7 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
WWW
2008
ACM
14 years 8 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
ICIP
2002
IEEE
14 years 9 months ago
Fitting smooth surfaces to scattered 3D data using piecewise quadratic approximation
The approximation of surfaces to scattered data is an important problem encountered in a variety of scientific applications, such as reverse engineering, computer vision, computer...
Hélio Pedrini, Murilo Vicente Gonçal...
FUNGAMES
2010
13 years 8 months ago
ajME: making game engines autonomic
Autonomic Computing is now showing its value as a solution to the increased complexities of maintaining computer systems and has been applied to many different fields. In this pap...
Pedro Martins, Julie A. McCann