Filters








12,606 Hits in 4.7 sec

Simplifying Signature Engineering by Reuse [chapter]

Sebastian Schmerl, Hartmut Koenig, Ulrich Flegel, Michael Meier
2006 Lecture Notes in Computer Science  
Automated approaches to reusing design and modeling decisions of available signatures also do not exist.  ...  It is based on the reuse of existing signatures to exploit similarities with existing attacks for deriving a new signature. The approach is based on an iterative abstraction of signatures.  ...  propose to simplify the signature design by applying attack models [1] . This approach corresponds to the design patterns of software engineering [2] .  ... 
doi:10.1007/11766155_31 fatcat:5rcx5wf7z5aszmbm5burt4kovu

Hunter: next-generation code reuse for Java

Yuepeng Wang, Yu Feng, Ruben Martins, Arati Kaushik, Isil Dillig, Steven P. Reiss
2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016  
We have implemented Hunter as an Eclipse plug-in and evaluate it by (a) comparing it against S 6 , a state-of-the-art code reuse tool, and (b) performing a user study.  ...  This paper presents a tool called Hunter that facilitates code reuse by finding relevant methods in large code bases and automatically synthesizing any necessary wrapper code.  ...  To simplify the example, suppose that the search engine yields a single function with the following signature: Point[] bresenham(int x0, int y0, int x1, int y1) Specifically, this function returns an array  ... 
doi:10.1145/2950290.2983934 dblp:conf/sigsoft/0001FMKDR16 fatcat:w7mnurcbjbc33l3vmj7uay7wui

A Mashup Architecture with Modeling and Simulation as a Service [chapter]

Sixuan Wang, Gabriel Wainer
2015 Lecture Notes in Computer Science  
Here we show how to simplify the M&S application development by using mashup technologies.  ...  Web services have been used in Modeling and Simulation (M&S) for many years, but it is still hard to develop complex M&S application by using heterogeneous data and varied services.  ...  Conclusion We presented a new method for building M&S mashups for fast application development by integrating heterogeneous data and services.  ... 
doi:10.1007/978-3-319-26190-4_17 fatcat:z5piy3rypfe27jenprmhtfmwoq

Multilateral Security: Enabling Technologies and Their Evaluation [chapter]

Andreas Pfitzmann
2001 Lecture Notes in Computer Science  
On the use of word networks to mimicry attack detection p. 423 Simplifying signature engineering by reuse p. 436 Redesign and implementation of evaluation dataset for intrusion detection system p. 451  ...  frames p. 238 SecTOOL -supporting requirements engineering for access control p. 254 Posaibilistic information flow control in MAKS and action refinement p. 268 Toward a framework for forensic  ... 
doi:10.1007/3-540-44577-3_4 fatcat:p6w5ynimhvd5xpyyb4spweujfa

A Method for Open Source License Compliance of Java Applications

Daniel German, Massimiliano Di Penta
2012 IEEE Software  
. // FOCUS: Software engineering for ComplianCe m ay/J u n E 2 0 12 | I E E E S o f t wa r E 59  ...  His research interests include software maintenance and evolution, reverse engineering, empirical software engineering, searchbased software engineering, and service-centric software engineering.  ...  signatures of the subject and the candidate.  ... 
doi:10.1109/ms.2012.50 fatcat:fjfilxovgzgz7nrl2ew3ajw4q4

An unabridged source code dataset for research in software reuse

Werner Janjic, Oliver Hummel, Marcus Schumacher, Colin Atkinson
2013 2013 10th Working Conference on Mining Software Repositories (MSR)  
This paper describes a large, unabridged data-set of Java source code gathered and shared as part of the Merobase Component Finder project of the Software-Engineering Group at the University of Mannheim  ...  It consists of the complete index used to drive the search engine, www.merobase.com, the vast majority 1 of the source code modules accessible through it, and a tool that enables researchers to efficiently  ...  were almost completely superseded by crawler-based search engines such as Google. II.  ... 
doi:10.1109/msr.2013.6624047 dblp:conf/msr/JanjicHSA13 fatcat:kpu5vnlnujbr5fofj3fbrsipga

Towards an Alloy Formal Model for Flexible Advanced Transactional Model Development

Barbara Gallina, Nicolas Guelfi, Pierre Kelsen
2009 2009 33rd Annual IEEE Software Engineering Workshop  
This paper presents the first step for having a full formal semantics of SPLACID by translation to Alloy.  ...  The Alloy specification obtained by this translation preserve the SPLACID main key-properties, namely, modularity, flexibility and reusability.  ...  with the simplified flat model.  ... 
doi:10.1109/sew.2009.13 dblp:conf/sew/GallinaGK09 fatcat:n2ewrtz4izgmnouj55sqwcrj6e

Type-Directed Code Reuse using Integer Linear Programming [article]

Yuepeng Wang, Yu Feng, Ruben Martins, Arati Kaushik, Isil Dillig, Steven P. Reiss
2016 arXiv   pre-print
We have implemented Hunter as an Eclipse plug-in and evaluate it by (a) comparing it against S6, a state-of-the-art code reuse tool, and (b) performing a user study.  ...  This paper presents a tool called Hunter that facilitates code reuse by finding relevant methods in large code bases and automatically synthesizing any necessary wrapper code.  ...  To simplify the example, suppose that the search engine yields a single function with the following signature: Point[] bresenham(int x0, int y0, int x1, int y1) Specifically, this function returns an array  ... 
arXiv:1608.07745v1 fatcat:cqrr2ji67zddpch5sfjjybsxem

Model Composition for Biological Mathematical Systems
english

Mandeep Gill, Steve McKeever, David Gavaghan
2014 Proceedings of the 2nd International Conference on Model-Driven Engineering and Software Development  
Our use-case retraces the steps taken by (Niederer et al., 2009) , which investigated the common history between cardiac models, and shows how they can be cast in our language to be reused and extended  ...  Our DSL enables 'physiological model engineering' through the development of generic modules exploiting high cohesion and low coupling.  ...  It shows a BR77 cell model parametrised by a module representing I Na , this may be provided by any ion channel model that implements the correct module signature.  ... 
doi:10.5220/0004699202170224 dblp:conf/modelsward/GillMG14 fatcat:qpuf5ks4cvbxxhzqfhugb6hisi

Design and Implementation of a Rule-based Security Engine for XML Web Services

P. Vasudevan, Lan Yang
2006 Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)  
By doing this we reuse the same security engine for more than one web service so that applications need not to implement separate security logic.  ...  The security engine provides support for Authentication, Authorization, Decryption and Signature Verification.  ...  The stock quote service is deployed on the Apache Axis server by invoking the following command: Java org.apache.axis.client.AdminClient deploy.wsdd  ... 
doi:10.1109/sera.2006.25 dblp:conf/sera/VasudevanY06 fatcat:q2d6dezj5vfazd47geskxmlt54

Toward high-level reuse of statechart-based AI in computer games

Christopher Dragert, Jörg Kienzle, Clark Verbrugge
2011 Proceeding of the 1st international workshop on Games and software engineering - GAS '11  
Here we advocate a layered Statechart-based AI as a modular approach that simplifies reuse.  ...  Reuse is accomplished by adding and removing modules to a new AI, largely enabled through event-renaming to ensure coherence with the interfaces.  ...  While some game components, such as graphics engines, are highly reused, AIs are often written from scratch, wasting development time on reimplementing basic behaviours.  ... 
doi:10.1145/1984674.1984684 fatcat:7wukx6zokrbpnevef2tohedpya

REBOUND: A Framework for Automated Component Adaptation [chapter]

JOHN PENIX, PERRY ALEXANDER
2004 Series on Component-Based Software Development  
This kind of adaptation can normally be identified and carried out by signature matching tools [30] .  ...  In Proceedings of the llth International Conference on Software Engineering, 1989. 24 James M. Purtilo and Joanne M. Atlee. Module reuse by interface adaptation.  ... 
doi:10.1142/9789812562425_0010 fatcat:f4l4amltybhzrhv264qliql3nm

Verification of genetic engineering in yeasts with nanopore whole genome sequencing [article]

Joseph H. Collins, Kevin W. Keating, Trent R. Jones, Shravani Balaji, Celeste B. Marsan, Marina Çomo, Zachary J. Newlon, Tom Mitchell, Bryan Bartley, Aaron Adler, Nicholas Roehner, Eric M Young
2020 bioRxiv   pre-print
We validated the workflow by sequencing a collection of 15 engineered yeasts built from different parent S. cerevisiae and nonconventional yeast strains.  ...  Interestingly, Prymetime was able to identify deletions and unintended integrations that were subsequently confirmed by other methods.  ...  This research is based upon work supported in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA) under Finding Engineering Linked  ... 
doi:10.1101/2020.05.05.079368 fatcat:srvgc2jtwbb33nldjiylbrpo5i

Conceptual Content Management for Software Engineering Processes [chapter]

Sebastian Bossung, Hans-Werner Sehring, Michael Skusa, Joachim W. Schmidt
2005 Lecture Notes in Computer Science  
In the application part of the paper we argue that software engineering can be substantially simplified by modelling SE entities from all the domains involved in an SE process homogeneously in an asset-oriented  ...  We base our approach on the core model of the computational domain which abstracts computational content (bodies of function code) by the computational concept of signatures (lists of typed function parameters  ...  In the application part of the paper we argue that software engineering can be substantially simplified by modelling SE entities from all the domains involved in an SE process homogeneously in an asset-oriented  ... 
doi:10.1007/11547686_23 fatcat:bvhnx3avhffgtdzapgcgmbzu3y

Improving Reuse of Web Service Compositions [chapter]

Carlos Granell, Michael Gould, Roy Grønmo, David Skogan
2005 Lecture Notes in Computer Science  
Here we focus on the description of the Service Abstraction Process, a critical step in order to enhance the service composition by facilitating the reuse of existing services.  ...  Both concrete operations are executed but only one is considered by the workflow engine.  ...  the workflow engine.  ... 
doi:10.1007/11545163_36 fatcat:erz7freohvgnhn6z4onjiltjom
« Previous Showing results 1 — 15 out of 12,606 results