Sciweavers

3889 search results - page 657 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
APSEC
2008
IEEE
15 years 10 months ago
Towards Unanticipated Runtime Adaptation of Java Applications
Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a sho...
Mario Pukall, Christian Kästner, Gunter Saake
153
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
174
Voted
APSEC
2007
IEEE
15 years 10 months ago
An Executable UML with OCL-based Action Semantics Language
Executable UML allows precisely describing the softtem at a higher level of abstraction. It bridges the semantics gap between the UML design models and the implementation. The exe...
Ke Jiang, Lei Zhang, Shigeru Miyake
149
Voted
TASE
2007
IEEE
15 years 10 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ICESS
2007
Springer
15 years 10 months ago
A Design Method for Heterogeneous Adders
The performance of existing adders varies widely in their speed and area requirements, which in turn sometimes makes designers pay a high cost in area especially when the delay req...
Jeong-Gun Lee, Jeong-A. Lee, Byeong-Seok Lee, Milo...