Sciweavers

2797 search results - page 337 / 560
» Code query by example
Sort
View
KBSE
2006
IEEE
15 years 10 months ago
Mining Aspects from Version History
Aspect mining identifies cross-cutting concerns in a program to help migrating it to an aspect-oriented design. Such concerns may not exist from the beginning, but emerge over ti...
Silvia Breu, Thomas Zimmermann
140
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 10 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
MSR
2006
ACM
15 years 10 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
DATE
2005
IEEE
192views Hardware» more  DATE 2005»
15 years 9 months ago
C Based Hardware Design for Wireless Applications
The algorithms used in wireless applications are increasingly more sophisticated and consequently more challenging to implement in hardware. Traditional design flows require devel...
Andrés Takach, Bryan Bowyer, Thomas Bollaer...
127
Voted
ITCC
2005
IEEE
15 years 9 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset