Sciweavers

3107 search results - page 293 / 622
» Error-Correcting Source Code
Sort
View
DSN
2006
IEEE
15 years 10 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
ECOOP
2005
Springer
15 years 10 months ago
The Emergent Structure of Development Tasks
Abstract. Integrated development environments have been designed and engineered to display structural information about the source code of large systems. When a development task li...
Gail C. Murphy, Mik Kersten, Martin P. Robillard, ...
SEKE
2005
Springer
15 years 10 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
SIGADA
2005
Springer
15 years 10 months ago
Temporal skeletons for verifying time
This paper presents an intermediate notation used in a framework for verification of real-time properties. The framework aims at overcoming the need for the framework user to hav...
Gustaf Naeser, Kristina Lundqvist, Lars Asplund
SAC
2004
ACM
15 years 9 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...