Sciweavers

488 search results - page 43 / 98
» Derivation of Java Monitors
Sort
View
108
Voted
APSEC
2004
IEEE
15 years 6 months ago
Systematic Operational Profile Development for Software Components
An operational profile is a quantification of the expected use of a system. Determining an operational profile for software is a crucial and difficult part of software reliability...
Rakesh Shukla, David A. Carrington, Paul A. Stroop...
154
Voted
SERP
2010
15 years 15 days ago
Towards Automatic Integration of Or-BAC Security Policies Using Aspects
We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a...
Yliès Falcone, Mohamad Jaber
151
Voted
PLDI
2011
ACM
14 years 5 months ago
Isolating and understanding concurrency errors using reconstructed execution fragments
In this paper we propose Recon, a new general approach to concurrency debugging. Recon goes beyond just detecting bugs, it also presents to the programmer short fragments of buggy...
Brandon Lucia, Benjamin P. Wood, Luis Ceze
141
Voted
POPL
2012
ACM
13 years 10 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
119
Voted
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
15 years 7 months ago
Mining Client-Side Activity for Personalization
“Garbage in. garbage out” is a well-known phrase in computer analysis, and one that comes to mind when mining Web data to draw conclusions about Web users. The challenge is th...
Kurt D. Fenstermacher, Mark Ginsburg