Sciweavers

1629 search results - page 225 / 326
» Infeasible Code Detection
Sort
View
ICST
2008
IEEE
15 years 8 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
INFOCOM
2007
IEEE
15 years 7 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
BIBE
2006
IEEE
123views Bioinformatics» more  BIBE 2006»
15 years 7 months ago
Isolation and Visualization of Codon Usage Biases
While genomic sequencing projects have proved an abundant source of information for biological studies ranging from the molecular to the ecological in scale, much of the informati...
Douglas W. Raiford, Dan E. Krane, Travis E. Doom, ...
CSMR
2006
IEEE
15 years 7 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens
123
Voted
IPPS
2006
IEEE
15 years 7 months ago
Design flow for optimizing performance in processor systems with on-chip coarse-grain reconfigurable logic
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-Dimensional Array of Processing Elem...
Michalis D. Galanis, Grigoris Dimitroulakos, Const...