Sciweavers

FASE
2010
Springer
13 years 2 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
FASE
2010
Springer
13 years 7 months ago
Incremental Service Composition Based on Partial Matching of Visual Contracts
Services provide access to software components that can be discovered dynamically via the Internet. The increasing number of services a requesters may be able to use demand support...
Muhammad Naeem, Reiko Heckel, Fernando Orejas, Fra...
FASE
2010
Springer
13 years 7 months ago
A Process to Effectively Identify "Guilty" Performance Antipatterns
Abstract. The problem of interpreting the results of software performance analysis is very critical. Software developers expect feedbacks in terms of architectural design alternati...
Vittorio Cortellessa, Anne Martens, Ralf Reussner,...
FASE
2010
Springer
13 years 7 months ago
Efficient Runtime Assertion Checking of Assignable Clauses with Datagroups
Runtime assertion checking is useful for debugging programs and specifications. Existing tools check invariants as well as method preand postconditions, but mostly ignore assignabl...
Hermann Lehner, Peter Müller
FASE
2010
Springer
13 years 7 months ago
An Automata-Theoretic Approach to Hardware/Software Co-verification
Abstract. In this paper, we present an automata-theoretic approach to Hardware/Software (HW/SW) co-verification. We designed a co-specification framework describing HW/SW systems; ...
Juncao Li, Fei Xie, Thomas Ball, Vladimir Levin, C...
FASE
2010
Springer
13 years 9 months ago
Incremental Consistency Checking of Dynamic Constraints
Software design models are routinely adapted to domains, companies, and applications. This requires customizable consistency checkers that allow engineers to dynamically adapt mode...
Iris Groher, Alexander Reder, Alexander Egyed
FASE
2010
Springer
13 years 11 months ago
Proving Consistency and Completeness of Model Classes Using Theory Interpretation
Abstract. Abstraction is essential in the formal specification of programs. A common way of writing abstract specifications is to specify implementations in terms of basic mathem...
Ádám Darvas, Peter Müller
FASE
2010
Springer
13 years 11 months ago
Shape Refinement through Explicit Heap Analysis
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
FASE
2010
Springer
13 years 11 months ago
Are Popular Classes More Defect Prone?
Traces of the evolution of software systems are left in a number of different repositories: such as configuration management systems, bug tracking systems, mailing lists. Develope...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza
FASE
2010
Springer
13 years 11 months ago
Memory Leaks Detection in Java by Bi-abductive Inference
This paper describes a compositional analysis algorithm for statically detecting leaks in Java programs. The algorithm is based on separation logic and exploits the concept of bi-a...
Dino Distefano, Ivana Filipovic