Sciweavers

1994 search results - page 105 / 399
» Limited Software Warranties
Sort
View
TCOS
2010
13 years 5 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
ICSE
2001
IEEE-ACM
14 years 2 months ago
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
AOSD
2010
ACM
14 years 5 months ago
Reusable enterprise metadata with pattern-based structural expressions
An essential part of modern enterprise software development is metadata. Mainstream metadata formats, including XML deployment descriptors and Java 5 annotations, suffer from a n...
Eli Tilevich, Myoungkyu Song
SMALLTALK
2007
Springer
14 years 4 months ago
Encapsulating and exploiting change with changeboxes
Real world software systems change continuously to meet new demands. Most programming languages and development environments, however, are more concerned with limiting the effects...
Marcus Denker, Tudor Gîrba, Adrian Lienhard,...
COMPSAC
2006
IEEE
14 years 4 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...