Sciweavers

1744 search results - page 251 / 349
» The Steganographic File System
Sort
View
ISIM
2007
15 years 5 months ago
Verification of Good Design Style of UML Models
Software architecture, and its behavior can be expressed as UML models. Models of complex systems can be also complex and hard to read – they may consists of hundreds of artifact...
Bogumila Hnatkowska
PTS
2008
109views Hardware» more  PTS 2008»
15 years 5 months ago
Runtime Verification of C Programs
We present in this paper a framework, RMOR, for monitoring the execution of C programs against state machines, expressed in a textual (nongraphical) format in files separate from t...
Klaus Havelund
SERP
2007
15 years 5 months ago
AppDetector: A Tool Prototype for Visualizing Java Code Dependencies on Relational Databases
- Modern tools have simplified the development of the enterprise applications by bridging gaps across various technologies like file systems, relational databases, messaging, and w...
Sai Ravindran, Paul L. Bergstein
ICVGIP
2004
15 years 5 months ago
Efficient Identification Based on Human Iris Patterns
This paper proposes a person identification system (PID), which works with non-illumination low-resolution eye images. Radial-Scan and threshold methods are used for Iris normaliz...
A. Chitra, R. Bremananth
IC
2001
15 years 5 months ago
The WebShop E-Commerce Framework
- This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web ...
Marcus Fontoura, Wolfgang Pree, Bernhard Rumpe