Sciweavers

1855 search results - page 172 / 371
» Composing model programs for analysis
Sort
View
156
Voted
IFIP
2010
Springer
14 years 10 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
131
Voted
CSMR
1999
IEEE
15 years 7 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
POPL
2007
ACM
16 years 3 months ago
Variance analyses from invariance analyses
An invariance assertion for a program location is a statement that always holds at during execution of the program. Program invariance analyses infer invariance assertions that ca...
Josh Berdine, Aziem Chawdhary, Byron Cook, Dino Di...
222
Voted
AOSD
2010
ACM
15 years 10 months ago
EffectiveAdvice: disciplined advice with explicit effects
Advice is a mechanism, widely used in aspect-oriented languages, that allows one program component to augment or modify the behavior of other components. When advice and other com...
Bruno C. d. S. Oliveira, Tom Schrijvers, William R...
ICSE
2010
IEEE-ACM
15 years 8 months ago
Using information fragments to answer the questions developers ask
Each day, a software developer needs to answer a variety of questions that require the integration of different kinds of project information. Currently, answering these questions...
Thomas Fritz, Gail C. Murphy