Sciweavers

677 search results - page 50 / 136
» Reverse Engineering Super-Repositories
Sort
View
CSMR
2010
IEEE
13 years 4 months ago
Under and Over Approximation of State Models Recovered for Ajax Applications
Abstract--In contrast to conventional multi-page Web applications, an Ajax application is developed as a single-page application in which content and structure are changed at runti...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
ESSOS
2011
Springer
13 years 15 days ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
FAST
2010
13 years 11 months ago
Write Endurance in Flash Drives: Measurements and Analysis
We examine the write endurance of USB flash drives using a range of approaches: chip-level measurements, reverse engineering, timing analysis, whole-device endurance testing, and ...
Simona Boboila, Peter Desnoyers
CAD
2008
Springer
13 years 9 months ago
Detecting approximate symmetries of discrete point subsets
Detecting approximate symmetries of parts of a model is important when attempting to determine the geometric design intent of approximate boundary-representation (B-rep) solid mod...
Ming Li, Frank C. Langbein, Ralph R. Martin
DAWAK
2009
Springer
13 years 6 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...