Sciweavers

2118 search results - page 171 / 424
» Execution of A Requirement Model in Software Development
Sort
View
DRM
2007
Springer
15 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
ISORC
2005
IEEE
15 years 10 months ago
Object-Reuse for More Predictable Real-Time Java Behavior
One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-...
Jameela Al-Jaroodi, Nader Mohamed
APSCC
2008
IEEE
15 years 11 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
ECOOPW
2004
Springer
15 years 10 months ago
Coordination and Adaptation Techniques for Software Entities
Abstract. Coordination and Adaptation are two key issues when developing complex distributed systems. Coordination focuses on the interaction among computational entities. Adaptati...
Carlos Canal, Juan Manuel Murillo, Pascal Poizat
VLSISP
2008
100views more  VLSISP 2008»
15 years 5 months ago
Memory-constrained Block Processing for DSP Software Optimization
Digital signal processing (DSP) applications involve processing long streams of input data. It is important to take into account this form of processing when implementing embedded ...
Ming-Yung Ko, Chung-Ching Shen, Shuvra S. Bhattach...