Sciweavers

3713 search results - page 566 / 743
» Constructing a Calculus of Programs
Sort
View
ACSAC
2002
IEEE
15 years 8 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
ICDCSW
2002
IEEE
15 years 8 months ago
Separating Introspection and Intercession to Support Metamorphic Distributed Systems
Many middleware platforms use computational reflection to support adaptive functionality. Most approaches intertwine the activity of observing behavior (introspection) with the a...
Eric P. Kasten, Philip K. McKinley, Seyed Masoud S...
INFOVIS
2002
IEEE
15 years 8 months ago
Visualization Schemas for Flexible Information Visualization
Relational databases provide significant flexibility to organize, store, and manipulate an infinite variety of complex data collections. This flexibility is enabled by the concept...
Chris North, Nathan Conklin, Varun Saini
SCAM
2002
IEEE
15 years 8 months ago
Visualization of Exception Propagation for Java Using Static Analysis
In this paper, we first present a static analysis based on set-based framework, which estimates exception propagation paths of Java programs. We construct an exception propagatio...
Byeong-Mo Chang, Jang-Wu Jo, Soon Hee Her
ICSE
2009
IEEE-ACM
15 years 7 months ago
An Empirical Study of Testing File-System-Dependent Software with Mock Objects
Unit testing is a technique of testing a single unit of a program in isolation. The testability of the unit under test can be reduced when the unit interacts with its environment....
Madhuri R. Marri, Tao Xie, Nikolai Tillmann, Jonat...