Sciweavers

326 search results - page 40 / 66
» Logical Engineering with Instance-Based Methods
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
POPL
2011
ACM
13 years 20 days ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
DAGSTUHL
2006
13 years 11 months ago
DecSerFlow: Towards a Truly Declarative Service Flow Language
The need for process support in the context of web services has triggered the development of many languages, systems, and standards. Industry has been developing software solutions...
Wil M. P. van der Aalst, Maja Pesic
CHB
2011
183views more  CHB 2011»
13 years 1 months ago
Towards an ICT-based psychology: E-psychology
Cognitive science is the scientific domain which studies, analyses, simulates and infers for various aspects, functions and procedures of human mentality such as, thinking, logic, ...
Athanasios Drigas, Lefteris Koukianakis, Yannis Pa...
ASE
2008
135views more  ASE 2008»
13 years 10 months ago
Deriving event-based transition systems from goal-oriented requirements models
Goal-oriented methods are increasingly popular for elaborating software requirements. They offer systematic support for incrementally building intentional, structural, and operati...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...