Sciweavers

2236 search results - page 217 / 448
» Secure Software Design in Practice
Sort
View
161
Voted
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 10 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
129
Voted
COMPSAC
2008
IEEE
15 years 3 months ago
Automated Code Generation for Industrial-Strength Systems
Model-driven engineering proposes to develop software systems by first creating an executable model of the system design and then transforming this model into an implementation. T...
Thomas Weigert, Frank Weil, Aswin van den Berg, Pa...
AIS
2006
Springer
15 years 3 months ago
"Carnivore personal edition": exploring distributed data surveillance
The goal of this paper is to offer, in straight forward terms, some practical insight into distributed data surveillance. I will use the software project Carnivore as a case study....
Alexander R. Galloway
117
Voted
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
15 years 9 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava
115
Voted
CSMR
2005
IEEE
15 years 9 months ago
Discovering Unanticipated Dependency Schemas in Class Hierarchies
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Gabriela Arévalo, Stéphane Ducasse, ...