Sciweavers

1336 search results - page 161 / 268
» codes 2005
Sort
View
99
Voted
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 6 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
103
Voted
WECWIS
2005
IEEE
157views ECommerce» more  WECWIS 2005»
15 years 6 months ago
Business Rules Integration in BPEL - A Service-Oriented Approach
Business rules change quite often. These changes cannot be handled efficiently by representing business rules embedded in the source code of the business logic. Efficient handli...
Florian Rosenberg, Schahram Dustdar
103
Voted
WORDS
2005
IEEE
15 years 6 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...
109
Voted
WSE
2005
IEEE
15 years 6 months ago
Modernizing JavaServer Pages by Transformation
One way to improve the maintainability of a web application is to separate its presentation from the business logic. Such separation not only makes a web application easier to evo...
Shannon Xu, Thomas R. Dean
WSE
2005
IEEE
15 years 6 months ago
Crosscutting Concerns in J2EE Applications
We explore the evolution benefits of adopting aspects in a J2EE setting by studying crosscutting concerns in a typical J2EE application. To identify these concerns, we take a top...
Ali Mesbah, Arie van Deursen