Sciweavers

416 search results - page 9 / 84
» Some new approaches for preventing software tampering
Sort
View
CASCON
1997
208views Education» more  CASCON 1997»
13 years 8 months ago
An architectural approach to building systems from COTS software components
As software systems become increasingly complex to build developers are turning more and more to integrating pre-built components from third party developers into their systems. T...
Mark R. Vigder, John C. Dean
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 1 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
ICCAD
2005
IEEE
106views Hardware» more  ICCAD 2005»
14 years 4 months ago
New decompilation techniques for binary-level co-processor generation
—Existing ASIPs (application-specific instruction-set processors) and compiler-based co-processor synthesis approaches meet the increasing performance requirements of embedded ap...
Greg Stiff, Frank Vahid
SIGCSE
2006
ACM
135views Education» more  SIGCSE 2006»
14 years 1 months ago
Personality types, learning styles, and an agile approach to software engineering education
This paper describes an initiative at North Carolina State University in which the undergraduate software engineering class was restructured in layout and in presentation. The cha...
Lucas Layman, Travis Cornwell, Laurie A. Williams
ICSE
2009
IEEE-ACM
14 years 8 hour ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...