Sciweavers

716 search results - page 100 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
ISSTA
2010
ACM
13 years 11 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
SAC
2009
ACM
14 years 2 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
SMI
2005
IEEE
111views Image Analysis» more  SMI 2005»
14 years 1 months ago
Smooth Adaptive Fitting of 3D Models Using Hierarchical Triangular Splines
The recent ability to measure quickly and inexpensively dense sets of points on physical objects has deeply influenced the way engineers used to represent shapes in CAD systems, ...
Alex Yvart, Stefanie Hahmann, Georges-Pierre Bonne...
CCS
2009
ACM
13 years 11 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...