Sciweavers

657 search results - page 60 / 132
» Recovering architectural assumptions
Sort
View
ICSE
2010
IEEE-ACM
15 years 4 months ago
Reverse engineering with the reclipse tool suite
Design pattern detection is a reverse engineering methodology that helps software engineers to analyze and understand legacy software by recovering its design and thereby aiding i...
Markus von Detten, Matthias Meyer, Dietrich Travki...
ECAI
1998
Springer
15 years 4 months ago
Transparent, Flexible, and Resource-adaptive Image Processing for Autonomous Service Robots
This paper describes SRIPPs, structured reactive image processing plans, that are tailored for the needs of autonomous service robots. SRIPPs are implemented on top of a modular, d...
Michael Beetz, Tom Arbuckle, Armin B. Cremers, M. ...
ARC
2006
Springer
85views Hardware» more  ARC 2006»
15 years 3 months ago
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking
Abstract. This paper presents a hardware architecture for UNIX password cracking using Hellman's time-memory trade-off; it is the first hardware design for a key search machin...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
TITB
2010
111views Education» more  TITB 2010»
14 years 6 months ago
Using heterogeneous wireless sensor networks in a telemonitoring system for healthcare
Ambient intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system...
Juan M. Corchado, Javier Bajo, Dante I. Tapia, Aji...
CIKM
2005
Springer
15 years 5 months ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino