Sciweavers

2572 search results - page 276 / 515
» codes 2008
Sort
View
IANDC
2008
128views more  IANDC 2008»
15 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
162
Voted
CJ
2006
123views more  CJ 2006»
15 years 4 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
IJAIT
2008
99views more  IJAIT 2008»
15 years 4 months ago
Optimal Basic Block Instruction Scheduling for Multiple-Issue Processors Using Constraint Programming
Instruction scheduling is one of the most important steps for improving the performance of object code produced by a compiler. A fundamental problem that arises in instruction sch...
Abid M. Malik, Jim McInnes, Peter van Beek
164
Voted
INFSOF
2008
121views more  INFSOF 2008»
15 years 4 months ago
A test driven approach for aspectualizing legacy software using mock systems
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
Michael Mortensen, Sudipto Ghosh, James M. Bieman
162
Voted
INFSOF
2008
148views more  INFSOF 2008»
15 years 4 months ago
Translating unstructured workflow processes to readable BPEL: Theory and implementation
The Business Process Execution Language for Web Services (BPEL) has emerged as the de-facto standard for implementing processes. Although intended as a language for connecting web ...
Wil M. P. van der Aalst, Kristian Bisgaard Lassen