Sciweavers

103 search results - page 17 / 21
» Integrating Custom Instruction Specifications into C Develop...
Sort
View
SWS
2005
ACM
15 years 5 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
15 years 4 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
ACSAC
2007
IEEE
15 years 6 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
BMCBI
2006
126views more  BMCBI 2006»
14 years 11 months ago
Genomes as geography: using GIS technology to build interactive genome feature maps
Background: Many commonly used genome browsers display sequence annotations and related attributes as horizontal data tracks that can be toggled on and off according to user prefe...
Mary E. Dolan, Constance C. Holden, M. Kate Beard,...
COMPSAC
1997
IEEE
15 years 3 months ago
A formal approach to software components classification and retrieval
I n this paper, we propose an approach to reuse-based software development using formal method. I n our approach, each software component is annotated with a set of predicates to ...
Chao-Tsun Chang, William C. Chu, Chung-Shyan Liu, ...