Sciweavers

3667 search results - page 208 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
100
Voted
CCS
2007
ACM
15 years 9 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
196
Voted
DIAL
2006
IEEE
243views Image Analysis» more  DIAL 2006»
15 years 9 months ago
AGORA: the Interactive Document Image Analysis Tool of the BVH Project
In this paper, we describe how meta-data of indexation can be extracted from historical document images using an interactive process with a software called AGORA. The algorithms i...
Jean-Yves Ramel, S. Busson, M. L. Demonet
PASTE
2005
ACM
15 years 9 months ago
Static control-flow analysis for reverse engineering of UML sequence diagrams
UML sequence diagrams are commonly used to represent the interactions among collaborating objects. Reverse-engineered sequence diagrams are constructed from existing code, and hav...
Atanas Rountev, Olga Volgin, Miriam Reddoch
136
Voted
FASE
2005
Springer
15 years 9 months ago
Improving System Understanding via Interactive, Tailorable, Source Code Analysis
In situations in which developers are not familiar with a system or its documentation is inadequate, the system’s source code becomes the only reliable source of information. Unf...
Vladimir Jakobac, Alexander Egyed, Nenad Medvidovi...
118
Voted
CODES
2003
IEEE
15 years 9 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang