Sciweavers

757 search results - page 66 / 152
» Composing Security-Aware Software
Sort
View
SIGSOFT
2008
ACM
16 years 4 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
142
Voted
WCRE
2009
IEEE
15 years 10 months ago
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality Assurance
Abstract—Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In partic...
Fabrizio Perin
RE
2006
Springer
15 years 3 months ago
Interaction Analysis in Aspect-Oriented Models
Aspect-oriented concepts are currently introduced in all phases of the software development life cycle. However, the complexity of interactions among different aspects and between...
Katharina Mehner, Mattia Monga, Gabriele Taentzer
150
Voted
WWW
2005
ACM
16 years 4 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
156
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...