Sciweavers

747 search results - page 93 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
WCRE
2005
IEEE
14 years 2 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
JSS
2010
150views more  JSS 2010»
13 years 7 months ago
Towards a general purpose architecture for UI generation
Many software projects spend a significant proportion of their time developing the User Interface (UI), therefore any degree of automation in this area has clear benefits. Such au...
Richard Kennard, John Leaney
CODES
2006
IEEE
14 years 14 days ago
A unified hardware/software runtime environment for FPGA-based reconfigurable computers using BORPH
This paper presents a hw/sw codesign methodology based on BORPH, an operating system designed for FPGA-based reconfigurable computers (RC's). By providing native kernel suppo...
Hayden Kwok-Hay So, Artem Tkachenko, Robert W. Bro...
WWW
2007
ACM
14 years 9 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad
ERSHOV
2006
Springer
14 years 13 days ago
An Agent-Based Architecture for Dialogue Systems
Abstract. Research in dialogue systems has been moving towards reusable and adaptable architectures for managing dialogue execution and integrating heterogeneous subsystems. In thi...
Mark Buckley, Christoph Benzmüller