Sciweavers

424 search results - page 31 / 85
» Service-Oriented Commonality Analysis Across Existing System...
Sort
View
WISA
2009
Springer
14 years 3 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
DOCENG
2004
ACM
14 years 1 months ago
Supporting virtual documents in just-in-time hypermedia systems
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries “dynamically” or in “real time”....
Li Zhang, Michael P. Bieber, David E. Millard, Vin...
EEE
2004
IEEE
14 years 6 days ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
MSR
2006
ACM
14 years 2 months ago
Micro pattern evolution
When analyzing the evolution history of a software project, we wish to develop results that generalize across projects. One approach is to analyze design patterns, permitting char...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
PLDI
2004
ACM
14 years 1 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam