Sciweavers

947 search results - page 148 / 190
» Declarative Programming in Prolog
Sort
View
CISIS
2010
IEEE
15 years 4 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
69
Voted
ER
2009
Springer
118views Database» more  ER 2009»
15 years 4 months ago
Specifying Valid Compound Terms in Interrelated Faceted Taxonomies
In previous work, we proposed an algebra whose operators allow to specify the valid compound terms of a faceted taxonomy, in a flexible manner (by combining positive and negative ...
Anastasia Analyti, Yannis Tzitzikas, Nicolas Spyra...
CIBSE
2009
ACM
15 years 4 months ago
A two-level formal semantics for the QVT language
Model Driven Engineering (MDE) proposes a software development process in which software is built by constructing one or more models, and transforming these into other models. In t...
Roxana S. Giandini, Claudia Pons, Gabriela P&eacut...
ICSM
2008
IEEE
15 years 4 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
74
Voted
CAV
2007
Springer
121views Hardware» more  CAV 2007»
15 years 3 months ago
Low-Level Library Analysis and Summarization
Programs typically make extensive use of libraries, including dynamically linked libraries, which are often not available in source-code form, and hence not analyzable by tools tha...
Denis Gopan, Thomas W. Reps