Sciweavers

3056 search results - page 549 / 612
» Open Implementation Analysis and Design
Sort
View
POS
1998
Springer
15 years 7 months ago
Optimizing the Read and Write Barriers for Orthogonal Persistence
Persistent programming languages manage volatile memory as a cache for stable storage, imposing a read barrier on operations that access the cache, and a write barrier on updates ...
Antony L. Hosking, Nathaniel Nystrom, Quintin I. C...
RE
1997
Springer
15 years 7 months ago
SOFL: A Formal Engineering Methodology for Industrial Applications
—Formal methods have yet to achieve wide industrial acceptance for several reasons. They are not well integrated into hed industrial software processes, their application require...
Shaoying Liu
122
Voted
EUC
2007
Springer
15 years 7 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
143
Voted
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
15 years 7 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
173
Voted
DAWAK
2009
Springer
15 years 7 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...