Sciweavers

143 search results - page 21 / 29
» Data-Flow Analysis of Program Fragments
Sort
View
CSFW
1999
IEEE
15 years 9 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
PROFES
2004
Springer
15 years 10 months ago
Refactoring Support Based on Code Clone Analysis
Abstract. Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software system...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
126
Voted
ATAL
2006
Springer
15 years 8 months ago
TANDEM - a design method for integrating web services into multi-agent systems
This paper introduces a new design method for multi-agent systems (MAS) that incorporate logic programming. The DigitalFriend is an example of a MAS with a built-in logic language...
Steve Goschnick, Sandrine Balbo, Leon Sterling, Ch...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
16 years 5 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
BMCBI
2010
86views more  BMCBI 2010»
15 years 5 months ago
ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite
Background: Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents...
Evgeniy V. Petrotchenko, Christoph H. Borchers