A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Simplifying Signature Engineering by Reuse
[chapter]
2006
Lecture Notes in Computer Science
Automated approaches to reusing design and modeling decisions of available signatures also do not exist. ...
It is based on the reuse of existing signatures to exploit similarities with existing attacks for deriving a new signature. The approach is based on an iterative abstraction of signatures. ...
propose to simplify the signature design by applying attack models [1] . This approach corresponds to the design patterns of software engineering [2] . ...
doi:10.1007/11766155_31
fatcat:5rcx5wf7z5aszmbm5burt4kovu
Hunter: next-generation code reuse for Java
2016
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016
We have implemented Hunter as an Eclipse plug-in and evaluate it by (a) comparing it against S 6 , a state-of-the-art code reuse tool, and (b) performing a user study. ...
This paper presents a tool called Hunter that facilitates code reuse by finding relevant methods in large code bases and automatically synthesizing any necessary wrapper code. ...
To simplify the example, suppose that the search engine yields a single function with the following signature: Point[] bresenham(int x0, int y0, int x1, int y1) Specifically, this function returns an array ...
doi:10.1145/2950290.2983934
dblp:conf/sigsoft/0001FMKDR16
fatcat:w7mnurcbjbc33l3vmj7uay7wui
A Mashup Architecture with Modeling and Simulation as a Service
[chapter]
2015
Lecture Notes in Computer Science
Here we show how to simplify the M&S application development by using mashup technologies. ...
Web services have been used in Modeling and Simulation (M&S) for many years, but it is still hard to develop complex M&S application by using heterogeneous data and varied services. ...
Conclusion We presented a new method for building M&S mashups for fast application development by integrating heterogeneous data and services. ...
doi:10.1007/978-3-319-26190-4_17
fatcat:z5piy3rypfe27jenprmhtfmwoq
Multilateral Security: Enabling Technologies and Their Evaluation
[chapter]
2001
Lecture Notes in Computer Science
On the use of word networks to mimicry attack detection p. 423 Simplifying signature engineering by reuse p. 436 Redesign and implementation of evaluation dataset for intrusion detection system p. 451 ...
frames
p. 238
SecTOOL -supporting requirements engineering for access control
p. 254
Posaibilistic information flow control in MAKS and action refinement
p. 268
Toward a framework for forensic ...
doi:10.1007/3-540-44577-3_4
fatcat:p6w5ynimhvd5xpyyb4spweujfa
A Method for Open Source License Compliance of Java Applications
2012
IEEE Software
. // FOCUS: Software engineering for ComplianCe m ay/J u n E 2 0 12 | I E E E S o f t wa r E 59 ...
His research interests include software maintenance and evolution, reverse engineering, empirical software engineering, searchbased software engineering, and service-centric software engineering. ...
signatures of the subject and the candidate. ...
doi:10.1109/ms.2012.50
fatcat:fjfilxovgzgz7nrl2ew3ajw4q4
An unabridged source code dataset for research in software reuse
2013
2013 10th Working Conference on Mining Software Repositories (MSR)
This paper describes a large, unabridged data-set of Java source code gathered and shared as part of the Merobase Component Finder project of the Software-Engineering Group at the University of Mannheim ...
It consists of the complete index used to drive the search engine, www.merobase.com, the vast majority 1 of the source code modules accessible through it, and a tool that enables researchers to efficiently ...
were almost completely superseded by crawler-based search engines such as Google.
II. ...
doi:10.1109/msr.2013.6624047
dblp:conf/msr/JanjicHSA13
fatcat:kpu5vnlnujbr5fofj3fbrsipga
Towards an Alloy Formal Model for Flexible Advanced Transactional Model Development
2009
2009 33rd Annual IEEE Software Engineering Workshop
This paper presents the first step for having a full formal semantics of SPLACID by translation to Alloy. ...
The Alloy specification obtained by this translation preserve the SPLACID main key-properties, namely, modularity, flexibility and reusability. ...
with the simplified flat model. ...
doi:10.1109/sew.2009.13
dblp:conf/sew/GallinaGK09
fatcat:n2ewrtz4izgmnouj55sqwcrj6e
Type-Directed Code Reuse using Integer Linear Programming
[article]
2016
arXiv
pre-print
We have implemented Hunter as an Eclipse plug-in and evaluate it by (a) comparing it against S6, a state-of-the-art code reuse tool, and (b) performing a user study. ...
This paper presents a tool called Hunter that facilitates code reuse by finding relevant methods in large code bases and automatically synthesizing any necessary wrapper code. ...
To simplify the example, suppose that the search engine yields a single function with the following signature: Point[] bresenham(int x0, int y0, int x1, int y1) Specifically, this function returns an array ...
arXiv:1608.07745v1
fatcat:cqrr2ji67zddpch5sfjjybsxem
Model Composition for Biological Mathematical Systems
english
2014
Proceedings of the 2nd International Conference on Model-Driven Engineering and Software Development
english
Our use-case retraces the steps taken by (Niederer et al., 2009) , which investigated the common history between cardiac models, and shows how they can be cast in our language to be reused and extended ...
Our DSL enables 'physiological model engineering' through the development of generic modules exploiting high cohesion and low coupling. ...
It shows a BR77 cell model parametrised by a module representing I Na , this may be provided by any ion channel model that implements the correct module signature. ...
doi:10.5220/0004699202170224
dblp:conf/modelsward/GillMG14
fatcat:qpuf5ks4cvbxxhzqfhugb6hisi
Design and Implementation of a Rule-based Security Engine for XML Web Services
2006
Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)
By doing this we reuse the same security engine for more than one web service so that applications need not to implement separate security logic. ...
The security engine provides support for Authentication, Authorization, Decryption and Signature Verification. ...
The stock quote service is deployed on the Apache Axis server by invoking the following command: Java org.apache.axis.client.AdminClient deploy.wsdd ...
doi:10.1109/sera.2006.25
dblp:conf/sera/VasudevanY06
fatcat:q2d6dezj5vfazd47geskxmlt54
Toward high-level reuse of statechart-based AI in computer games
2011
Proceeding of the 1st international workshop on Games and software engineering - GAS '11
Here we advocate a layered Statechart-based AI as a modular approach that simplifies reuse. ...
Reuse is accomplished by adding and removing modules to a new AI, largely enabled through event-renaming to ensure coherence with the interfaces. ...
While some game components, such as graphics engines, are highly reused, AIs are often written from scratch, wasting development time on reimplementing basic behaviours. ...
doi:10.1145/1984674.1984684
fatcat:7wukx6zokrbpnevef2tohedpya
REBOUND: A Framework for Automated Component Adaptation
[chapter]
2004
Series on Component-Based Software Development
This kind of adaptation can normally be identified and carried out by signature matching tools [30] . ...
In Proceedings
of the llth International
Conference
on Software
Engineering,
1989.
24
James M. Purtilo and Joanne M. Atlee. Module reuse by interface
adaptation. ...
doi:10.1142/9789812562425_0010
fatcat:f4l4amltybhzrhv264qliql3nm
Verification of genetic engineering in yeasts with nanopore whole genome sequencing
[article]
2020
bioRxiv
pre-print
We validated the workflow by sequencing a collection of 15 engineered yeasts built from different parent S. cerevisiae and nonconventional yeast strains. ...
Interestingly, Prymetime was able to identify deletions and unintended integrations that were subsequently confirmed by other methods. ...
This research is based upon work supported in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA) under Finding Engineering Linked ...
doi:10.1101/2020.05.05.079368
fatcat:srvgc2jtwbb33nldjiylbrpo5i
Conceptual Content Management for Software Engineering Processes
[chapter]
2005
Lecture Notes in Computer Science
In the application part of the paper we argue that software engineering can be substantially simplified by modelling SE entities from all the domains involved in an SE process homogeneously in an asset-oriented ...
We base our approach on the core model of the computational domain which abstracts computational content (bodies of function code) by the computational concept of signatures (lists of typed function parameters ...
In the application part of the paper we argue that software engineering can be substantially simplified by modelling SE entities from all the domains involved in an SE process homogeneously in an asset-oriented ...
doi:10.1007/11547686_23
fatcat:bvhnx3avhffgtdzapgcgmbzu3y
Improving Reuse of Web Service Compositions
[chapter]
2005
Lecture Notes in Computer Science
Here we focus on the description of the Service Abstraction Process, a critical step in order to enhance the service composition by facilitating the reuse of existing services. ...
Both concrete operations are executed but only one is considered by the workflow engine. ...
the workflow engine. ...
doi:10.1007/11545163_36
fatcat:erz7freohvgnhn6z4onjiltjom
« Previous
Showing results 1 — 15 out of 12,606 results