Sciweavers

4421 search results - page 616 / 885
» Libraries
Sort
View
VISSOFT
2005
IEEE
15 years 8 months ago
Interactive Exploration of UML Sequence Diagrams
Sequence diagrams are commonly used to represent object interactions in software systems. Reverse-engineered sequence diagrams, which are constructed from existing code, are becom...
Richard Sharp, Atanas Rountev
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WETICE
2005
IEEE
15 years 8 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
WETICE
2005
IEEE
15 years 8 months ago
A Multicast Transport Driver for Globus XIO
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft
ACMSE
2005
ACM
15 years 8 months ago
Facilitating and automating empirical evaluation
Through the automation of empirical evaluation we hope to alleviate evaluation problems encountered by software designers who are relatively new to the process. Barriers to good e...
Laurian Hobby, John Booker, D. Scott McCrickard, C...