Sciweavers

365 search results - page 13 / 73
» Extracting Business Rules from Source Code
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 3 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
87
Voted
APPINF
2003
15 years 1 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
69
Voted
WEBI
2005
Springer
15 years 5 months ago
Opportunities from Open Source Search
Internet search has a strong business model that permits a free service to users, so it is difficult to see why, if at all, there should be open source offerings as well. This pa...
Wray L. Buntine, Karl Aberer, Ivana Podnar, Martin...
82
Voted
TSE
2008
113views more  TSE 2008»
14 years 11 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JOT
2007
99views more  JOT 2007»
14 years 11 months ago
A Framework to Specify Declarative Rules on Objects, Attributes and Associations in the Object Model
There are various mechanisms for creating an application object model. These mechanisms are used for modeling the application Meta model and the user models. Some of the mechanism...
C. Anantaram