Sciweavers

1943 search results - page 202 / 389
» End-to-End Integration Testing
Sort
View
150
Voted
EUROMICRO
2005
IEEE
15 years 10 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
133
Voted
ISLPED
2005
ACM
91views Hardware» more  ISLPED 2005»
15 years 10 months ago
LAP: a logic activity packing methodology for leakage power-tolerant FPGAs
As FPGAs enter the nanometer regime, several modifications are needed to reduce the increasing leakage power dissipation. Hence, this work presents some modifications to the FPG...
Hassan Hassan, Mohab Anis, Mohamed I. Elmasry
ICWE
2005
Springer
15 years 10 months ago
Adding Usability to Web Engineering Models and Tools
In this paper, we examine how the task of creating usable websites can be made more efficient. Models and generation of websites have been a central issue for Web Engineering over ...
Richard Atterer, Albrecht Schmidt
116
Voted
IJCNLP
2005
Springer
15 years 10 months ago
A Lexicon-Constrained Character Model for Chinese Morphological Analysis
Abstract. This paper proposes a lexicon-constrained character model that combines both word and character features to solve complicated issues in Chinese morphological analysis. A ...
Yao Meng, Hao Yu, Fumihito Nishino
PPAM
2005
Springer
15 years 10 months ago
Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA
In this paper, we present a peer-to-peer (P2P) system with remote method invocations, combining RMIX and JXTA technologies, and underpinning the H2O distributed resource sharing pl...
Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Da...