Sciweavers

618 search results - page 16 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
PEPM
2009
ACM
15 years 8 months ago
Program transformation for numerical precision
This article introduces a new program transformation in order to enhance the numerical accuracy of floating-point computations. We consider that a program would return an exact r...
Matthieu Martel
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 1 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
OOPSLA
2001
Springer
15 years 4 months ago
A Categorization of Classes based on the Visualization of their Internal Structure: The Class Blueprint
The reengineering and reverse engineering of software systems is gaining importance in software industry, because the accelerated turnover in software companies creates legacy sys...
Michele Lanza, Stéphane Ducasse
INFOCOM
2011
IEEE
14 years 3 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
DRM
2003
Springer
15 years 4 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon