Sciweavers

418 search results - page 35 / 84
» GUI Inspection from Source Code Analysis
Sort
View
SAC
2004
ACM
15 years 5 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
WCRE
1999
IEEE
15 years 4 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
DSN
2003
IEEE
15 years 5 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
GLOBECOM
2008
IEEE
15 years 6 months ago
Queued Cooperative Wireless Networks With Rateless Codes
—Cooperative communication using rateless codes, in which the source transmits an infinite number of parity bits to the destination until the receipt of an acknowledgment, has r...
Neelesh B. Mehta, Vinod Sharma, Gaurav Bansal
CISS
2007
IEEE
15 years 6 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.