Sciweavers

107
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Cryptographic Protocol Verification Using Tractable Classes of Horn Clauses
We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifyin...
Helmut Seidl, Kumar Neeraj Verma
153
Voted
CSMR
2004
IEEE
15 years 7 months ago
A Distributed Architecture for Dynamic Analyses on User-Profile Data
Combining static and dynamic information is highly relevant in many reverse engineering, program comprehension and maintenance task. Dynamic analysis is particularly effective whe...
Giuliano Antoniol, Massimiliano Di Penta
125
Voted
CSMR
2004
IEEE
15 years 7 months ago
Source Code Modularization Using Lattice of Concept Slices
Most legacy systems have been altered due to prolonged maintenance to the point that they deviate significantly from their original and intended design and consequently, they lack...
Raihan Al-Ekram, Kostas Kontogiannis
129
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Coordination of Actions in an Autonomous Robotic System
Robots are autonomous agents whose actions are performed in the real world during a period of time. There are a number of general constraints on such actions, for example that the ...
Erik Sandewall
148
Voted
CSMR
2004
IEEE
15 years 7 months ago
High-Level Polymetric Views of Condensed Run-time Information
Understanding the run-time behavior of object-oriented legacy systems is a complex task due to factors such as late binding and polymorphism. Current approaches extract and use in...
Stéphane Ducasse, Michele Lanza, Roland Ber...