Sciweavers

694 search results - page 68 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
EUROMICRO
1996
IEEE
15 years 7 months ago
Behaviour-Preserving Transformations in SHE: A Formal Approach to Architecture Design
SHE (Software/Hardware Engineering) is an objectoriented analysis, specification and design method for complex reactive hardware/software systems. SHE is based on the formal speci...
Jeroen Voeten, P. H. A. van der Putten, M. P. J. S...
144
Voted
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 8 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
141
Voted
JUCS
2007
80views more  JUCS 2007»
15 years 3 months ago
Higher-Order Lazy Functional Slicing
: Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is pa...
Nuno F. Rodrigues, Luís Soares Barbosa
KBSE
2005
IEEE
15 years 9 months ago
Automated path generation for software fault localization
Localizing the cause(s) of an observable error lies at the heart of program debugging. Fault localization often proceeds by comparing the failing program run with some “successf...
Tao Wang, Abhik Roychoudhury
144
Voted
ISSRE
2005
IEEE
15 years 9 months ago
Prioritize Code for Testing to Improve Code Coverage of Complex Software
Code prioritization for testing promises to achieve the maximum testing coverage with the least cost. This paper presents an innovative method to provide hints on which part of co...
J. Jenny Li