Sciweavers

127 search results - page 17 / 26
» Contract-Based Approach to Analyze Software Components
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
ISSTA
2004
ACM
15 years 5 months ago
Automating commutativity analysis at the design level
Two operations commute if executing them serially in either order results in the same change of state. In a system in which commands may be issued simultaneously by different use...
Greg Dennis, Robert Seater, Derek Rayside, Daniel ...
ESEM
2009
ACM
15 years 6 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
CCE
2006
14 years 11 months ago
An object-oriented framework for modular chemical process simulation with semiconductor processing applications
This paper discusses the development of a set of object-oriented modular simulation tools for solving lumped and spatially distributed models generated from chemical process desig...
Jing Chen, Raymond A. Adomaitis
WCRE
2009
IEEE
15 years 6 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...