Sciweavers

7380 search results - page 319 / 1476
» Engineering Software Intensive Systems
Sort
View
142
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
130
Voted
WCRE
2005
IEEE
15 years 9 months ago
Source versus Object Code Extraction for Recovering Software Architecture
The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an ...
Ahmed E. Hassan, Zhen Ming Jiang, Richard C. Holt
131
Voted
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
15 years 10 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
129
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
STRADA: A Tool for Scenario-Based Feature-to-Code Trace Detection and Analysis
Software engineers frequently struggle with understanding the relationships between the source code of a system and its requirements or high-level features. These relationships ar...
Alexander Egyed, Gernot Binder, Paul Grünbach...
112
Voted
ICSM
2008
IEEE
15 years 10 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos