Sciweavers

493 search results - page 23 / 99
» An Analysis of Tool-Based Research in Software Engineering
Sort
View
DRM
2004
Springer
15 years 3 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
CSMR
2005
IEEE
15 years 3 months ago
Evaluating an Embedded Software Reference Architecture -- Industrial Experience Report
In this paper, we discuss experiences gained during evaluation of the maintainability of a reference architecture in use at Oc´e, one of the world’s leading copier manufacturer...
Bas Graaf, Hylke W. van Dijk, Arie van Deursen
ICST
2009
IEEE
14 years 7 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
WCRE
2009
IEEE
15 years 4 months ago
SQUAD: Software Quality Understanding through the Analysis of Design
—Object-oriented software quality models usually use metrics of classes and of relationships among classes to assess the quality of systems. However, software quality does not de...
Foutse Khomh
ISPW
2005
IEEE
15 years 3 months ago
Automatically Analyzing Software Processes: Experience Report
Sound methods of analysis and comparison of software processes are crucial for such tasks as process understanding, process correctness verification, evolution management, proces...
Rodion M. Podorozhny, Dewayne E. Perry, Leon J. Os...