Sciweavers

446 search results - page 75 / 90
» Safe Integration of New Concerns in a Software Architecture
Sort
View
CPAIOR
2004
Springer
15 years 1 months ago
Building Models through Formal Specification
Abstract. Over the past years, a number of increasingly expressive languages for modelling constraint and optimisation problems have evolved. In developing a strategy to ease the c...
Gerrit Renker, Hatem Ahriz
CF
2004
ACM
15 years 2 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
SENSYS
2006
ACM
15 years 3 months ago
Capturing high-frequency phenomena using a bandwidth-limited sensor network
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...
JISBD
2001
14 years 10 months ago
Conceptual Modeling of Device-Independent Web Applications
Existing tools intended to build and deploy engaging complex Web sites (including functionality) have shown to be inadequate to face the software production process in an unified a...
Jaime Gómez, Cristina Cachero
COMPUTER
2007
153views more  COMPUTER 2007»
14 years 9 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis