Sciweavers

3792 search results - page 121 / 759
» Techniques for Trusted Software Engineering
Sort
View
135
Voted
FAC
2006
122views more  FAC 2006»
15 years 3 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
122
Voted
COMPSAC
2000
IEEE
15 years 8 months ago
Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study
: A two-layer adaptive wrapping technique is proposed in this paper to migrate legacy Energy Management System (EMS) modules into reusable components, and therefore transforming th...
Qing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang
137
Voted
WWW
2005
ACM
16 years 4 months ago
WEESA: Web engineering for semantic Web applications
The success of the Semantic Web crucially depends on the existence of Web pages that provide machine-understandable meta-data. This meta-data is typically added in the semantic an...
Gerald Reif, Harald Gall, Mehdi Jazayeri
146
Voted
WCRE
2008
IEEE
15 years 10 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
135
Voted
HT
2007
ACM
15 years 7 months ago
A semantics-based aspect-oriented approach to adaptation in web engineering
In the modern Web, users are accessing their favourite Web applications from any place, at any time and with any device. In this setting, they expect the application to user-tailo...
Sven Casteleyn, William Van Woensel, Geert-Jan Hou...