Sciweavers

897 search results - page 162 / 180
» Maintenance-Oriented Design and Development: A Case Study
Sort
View
ERSHOV
2003
Springer
14 years 1 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
SIGMOD
2010
ACM
259views Database» more  SIGMOD 2010»
14 years 1 months ago
PODS: a new model and processing algorithms for uncertain data streams
Uncertain data streams, where data is incomplete, imprecise, and even misleading, have been observed in many environments. Feeding such data streams to existing stream systems pro...
Thanh T. L. Tran, Liping Peng, Boduo Li, Yanlei Di...
GPCE
2009
Springer
14 years 1 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
MKM
2009
Springer
14 years 1 months ago
Integrating Web Services into Active Mathematical Documents
Abstract. Active mathematical documents are distinguished from traditional paper-oriented ones by their ability to interactively adapt to a reader’s inputs. This includes changes...
Jana Giceva, Christoph Lange 0002, Florian Rabe
ENTCS
2002
107views more  ENTCS 2002»
13 years 8 months ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...