Sciweavers

213 search results - page 30 / 43
» Software Assurance During Maintenance
Sort
View
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
SOFTVIS
2005
ACM
14 years 1 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk
IRI
2007
IEEE
14 years 1 months ago
An Object-Oriented Approach for High Availability of Applications Integration
The integration of networked applications, especially those requiring continuous access to shared information resources and databases, may be effected by scheduled unavailability ...
Jameela Al-Jaroodi, Nader Mohamed
ER
2004
Springer
89views Database» more  ER 2004»
14 years 28 days ago
Elementary Translations: The Seesaws for Achieving Traceability Between Database Schemata
There exist several recent approaches that leverages the use of model transformations during software development. The existence erent kinds of models, at different levels of abst...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
ESSOS
2009
Springer
14 years 5 days ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson