Sciweavers

5668 search results - page 973 / 1134
» Overlaps in Requirements Engineering
Sort
View
CGO
2006
IEEE
15 years 10 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
150
Voted
CODES
2006
IEEE
15 years 10 months ago
Multi-processor system design with ESPAM
For modern embedded systems, the complexity of embedded applications has reached a point where the performance requirements of these applications can no longer be supported by emb...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
COMPSAC
2006
IEEE
15 years 10 months ago
An Agent-Based Metric for Quality of Services over Wireless Networks
In a wireless LAN environment, clients tend to associate with the nearest access point (AP) which usually provides the strongest signal. However, this does not guarantee that user...
Yaw-Chung Chen, Wen-Yen Chen
KBSE
2006
IEEE
15 years 10 months ago
Sieve: A Tool for Automatically Detecting Variations Across Program Versions
Software systems often undergo many revisions during their lifetime as new features are added, bugs repaired, abstractions simplified and refactored, and performance improved. Wh...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
SCAM
2006
IEEE
15 years 10 months ago
Stop-List Slicing
Traditional program slicing requires two parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the...
Keith Gallagher, David Binkley, Mark Harman