Sciweavers

726 search results - page 67 / 146
» Reverse engineering: a roadmap
Sort
View
C3S2E
2009
ACM
14 years 2 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
INDIASE
2009
ACM
14 years 4 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 10 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw

Lecture Notes
889views
15 years 9 months ago
Future Directions in Computing
Silicon-based electronics is the foundation of computing devices. The computer industry is reaching an important milestone, where physical limits arising from using optical lithogr...
Sherief Reda
ICIAP
2007
ACM
14 years 4 months ago
A new and reliable Poisson noise estimator for radiographic images
Digital images in general, and radiographies in particular, are mainly affected by photon counting noise. In this paper, we provide a method to estimate the gain of the imaging se...
Iuri Frosio, Mirko Lucchese, N. Alberto Borghese