Sciweavers

6171 search results - page 206 / 1235
» The FrameNet Data and Software
Sort
View
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
15 years 8 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
SERP
2008
15 years 5 months ago
Mapping Data-Flow Dependencies onto Distributed Embedded Systems
Model-driven development (MDD) is an emerging paradigm and has become state-of-the-art for embedded systems software design. In the overall design process, several steps have to be...
Stefan Kugele, Wolfgang Haberl
XPU
2009
Springer
15 years 11 months ago
Communicating Domain Knowledge in Executable Acceptance Test Driven Development
We present results of a case study looking at how domain knowledge is communicated to developers using executable acceptance test driven development at a large software development...
Shelly Park, Frank Maurer
COMPSAC
2007
IEEE
15 years 10 months ago
Ontologies, JavaBeans and Relational Databases for enabling semantic programming
Knowledge-based software engineering enables a programmer to integrate rich semantics in the software development process. In this work, we show how an OWL/RDF knowledge base can ...
Ioannis N. Athanasiadis, Ferdinando Villa, Andrea ...
169
Voted
ISSRE
2000
IEEE
15 years 8 months ago
Criteria for Testing Polymorphic Relationships
The emphasis in object-oriented programs is on defining abstractions that have both state and behavior. This emphasis causes a shift in focus from software units to the way softw...
Roger T. Alexander, A. Jefferson Offutt