Sciweavers

5668 search results - page 1004 / 1134
» The case for software evolution
Sort
View
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
ERCIMDL
2003
Springer
114views Education» more  ERCIMDL 2003»
15 years 7 months ago
Implementing Preservation Strategies for Complex Multimedia Objects
Addressing the preservation and long-term access issues for digital resources is one of the key challenges facing informational organisations such as libraries, archives, cultural ...
Jane Hunter, Sharmin Choudhury
ERSHOV
2003
Springer
15 years 7 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
GECCO
2003
Springer
108views Optimization» more  GECCO 2003»
15 years 7 months ago
Evolutionary Testing of Flag Conditions
Evolutionary Testing (ET) has been shown to be very successful in testing real world applications [16]. However, it has been pointed out [11], that further research is necessary if...
André Baresel, Harmen Sthamer
ICFEM
2003
Springer
15 years 7 months ago
Generic Interacting State Machines and Their Instantiation with Dynamic Features
Interacting State Machines (ISMs) are used to model reactive systems and to express and verify their properties. They can be seen both as automata exchanging messages simultaneousl...
David von Oheimb, Volkmar Lotz
« Prev « First page 1004 / 1134 Last » Next »