Sciweavers

4725 search results - page 707 / 945
» Dependence-Based Program Analysis
Sort
View
164
Voted
IWIA
2005
IEEE
15 years 10 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
134
Voted
LICS
2005
IEEE
15 years 10 months ago
Generalizing Parametricity Using Information-flow
Run-time type analysis allows programmers to easily and concisely define operations based upon type structure, such as serialization, iterators, and structural equality. However,...
Geoffrey Washburn, Stephanie Weirich
QSIC
2005
IEEE
15 years 10 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
VISSOFT
2005
IEEE
15 years 10 months ago
The Dominance Tree in Visualizing Software Dependencies
Dominance analysis from graph theory allows one to locate subordinated software elements in a rooted dependency graph. It identifies the nesting structure for a dependency graph ...
Raimar Falke, Raimund Klein, Rainer Koschke, Joche...
APN
2005
Springer
15 years 10 months ago
Derivation of Non-structural Invariants of Petri Nets Using Abstract Interpretation
stract Interpretation Robert Claris´o, Enric Rodr´ıguez-Carbonell, and Jordi Cortadella Universitat Polit`ecnica de Catalunya, Barcelona, Spain Abstract interpretation is a para...
Robert Clarisó, Enric Rodríguez-Carb...