Sciweavers

1994 search results - page 154 / 399
» Limited Software Warranties
Sort
View
ICSE
2009
IEEE-ACM
14 years 5 months ago
Complete and accurate clone detection in graph-based models
Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based develo...
Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, J...
ISPAN
2009
IEEE
14 years 5 months ago
Cyberaide Creative: On-Demand Cyberinfrastructure Provision in Clouds
As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to theses resources also increases. Until recently the use of com...
Casey Rathbone, Lizhe Wang, Gregor von Laszewski, ...
IWPC
2009
IEEE
14 years 5 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
BTW
2009
Springer
142views Database» more  BTW 2009»
14 years 5 months ago
Bridging the Gap between Variability in Client Application and Database Schema
: Database schemas are used to describe the logical design of a database. Diverse groups of users have different perspectives on the schema which leads to different local schemas. ...
Norbert Siegmund, Christian Kästner, Marko Ro...
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
14 years 5 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim