Sciweavers

852 search results - page 15 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
103
Voted
ACSAC
2000
IEEE
15 years 4 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
CORR
2008
Springer
155views Education» more  CORR 2008»
14 years 11 months ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
ICSE
2003
IEEE-ACM
15 years 11 months ago
Tools for Understanding the Behavior of Telecommunication Systems
Many methods and tools for the reengineering of software systems have been developed so far. However, the domain-specific requirements of telecommunication systems have not been a...
André Marburger, Bernhard Westfechtel
81
Voted
ICSE
2010
IEEE-ACM
15 years 1 months ago
Linking e-mails and source code artifacts
E-mails concerning the development issues of a system constitute an important source of information about high-level design decisions, low-level implementation concerns, and the s...
Alberto Bacchelli, Michele Lanza, Romain Robbes
SCAM
2002
IEEE
15 years 4 months ago
Parallel Support for Source Code Analysis and Modification
Tools that analyze and enhance large-scale software systems using symbolic reasoning are computationally expensive, and yet processors are cheap. We believe that enabling tools wi...
Ira D. Baxter