Sciweavers

2132 search results - page 126 / 427
» Automated software winnowing
Sort
View
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 4 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
APSEC
2002
IEEE
15 years 4 months ago
Contextual Matching of Software Library Components
Many automated programming environments construct software by integrating predefined components from a software library. A fundamental challenge in this process is to match the p...
Colin J. Fidge
WCRE
1999
IEEE
15 years 3 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
CBSE
2006
Springer
15 years 2 months ago
On-Demand Quality-Oriented Assistance in Component-Based Software Evolution
Abstract. During an architectural evolution of a component-based software, certain quality attributes may be weakened. This is due to the lack of an explicit definition of the link...
Chouki Tibermacine, Régis Fleurquin, Salah ...
SPLC
2007
15 years 11 days ago
Product Line Implementation using Aspect-Oriented and Model-Driven Software Development
Software product line engineering aims to reduce development time, effort, cost, and complexity by taking advantage of the commonality within a portfolio of similar products. The ...
Markus Völter, Iris Groher