Sciweavers

2236 search results - page 365 / 448
» Secure Software Design in Practice
Sort
View
SPRINGSIM
2010
13 years 9 months ago
Advanced IDE for modeling and simulation of discrete event systems
: Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been deve...
Matías Bonaventura, Gabriel A. Wainer, Rodr...
TOSEM
2010
159views more  TOSEM 2010»
13 years 9 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
TSE
2010
140views more  TSE 2010»
13 years 9 months ago
Learning a Metric for Code Readability
—In this paper, we explore the concept of code readability and investigate its relation to software quality. With data collected from 120 human annotators, we derive associations...
Raymond P. L. Buse, Westley Weimer
UIST
2010
ACM
13 years 9 months ago
TurKit: human computation algorithms on mechanical turk
Mechanical Turk provides an on-demand source of human computation. This provides a tremendous opportunity to explore algorithms which incorporate human computation as a function c...
Greg Little, Lydia B. Chilton, Max Goldman, Robert...
VLSI
2010
Springer
13 years 5 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...