Sciweavers

1099 search results - page 212 / 220
» Using Transformation Systems for Software Maintenance and Re...
Sort
View
EUROCRYPT
2004
Springer
15 years 2 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
98
Voted
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
15 years 3 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
FIW
1998
130views Communications» more  FIW 1998»
14 years 10 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
95
Voted
BMCBI
2005
112views more  BMCBI 2005»
14 years 9 months ago
Web services and workflow management for biological resources
Backgorund: The completion of the Human Genome Project has resulted in large quantities of biological data which are proving difficult to manage and integrate effectively. There i...
Paolo Romano 0001, Domenico Marra, Luciano Milanes...
PPAM
2007
Springer
15 years 3 months ago
Enhancing Productivity in High Performance Computing through Systematic Conditioning
Abstract. In order to take full advantage of high-end computing platforms, scientific applications often require modifications to source codes, and to their build systems that ge...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...