Sciweavers

88 search results - page 6 / 18
» Overhearing Conversations in Global Software Engineering - R...
Sort
View
ISSRE
2005
IEEE
14 years 1 months ago
Prioritize Code for Testing to Improve Code Coverage of Complex Software
Code prioritization for testing promises to achieve the maximum testing coverage with the least cost. This paper presents an innovative method to provide hints on which part of co...
J. Jenny Li
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
13 years 12 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
AC
1997
Springer
13 years 11 months ago
Recent Developments in the Design of Conventional Cryptographic Algorithms
Abstract. This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a...
Bart Preneel, Vincent Rijmen, Antoon Bosselaers
CODES
2010
IEEE
13 years 4 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
SIGSOFT
2009
ACM
14 years 8 months ago
Refactoring for reentrancy
A program is reentrant if distinct executions of that program on distinct inputs cannot affect each other. Reentrant programs have the desirable property that they can be deployed...
Jan Wloka, Manu Sridharan, Frank Tip