Sciweavers

2081 search results - page 266 / 417
» codes 2006
Sort
View
75
Voted
ITNG
2006
IEEE
15 years 5 months ago
On the Security of a Repaired Mental Poker Protocol
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be flawed in 2004: any player (or any outsider knowing the deck coding) is able to...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
IWPC
2006
IEEE
15 years 5 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
IWPC
2006
IEEE
15 years 5 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
KBSE
2006
IEEE
15 years 5 months ago
Mining Aspects from Version History
Aspect mining identifies cross-cutting concerns in a program to help migrating it to an aspect-oriented design. Such concerns may not exist from the beginning, but emerge over ti...
Silvia Breu, Thomas Zimmermann
KBSE
2006
IEEE
15 years 5 months ago
Command-Form Coverage for Testing Database Applications
The testing of database applications poses new challenges for software engineers. In particular, it is difficult to thoroughly test the interactions between an application and it...
William G. J. Halfond, Alessandro Orso