Sciweavers

4616 search results - page 266 / 924
» Extreme Components Analysis
Sort
View
ICSM
2006
IEEE
15 years 10 months ago
An Extensible Meta-Model for Program Analysis
— Software maintenance tools for program analysis and refactoring rely on a meta-model capturing the relevant properties of programs. However, what is considered relevant may cha...
Dennis Strein, Rüdiger Lincke, Jonas Lundberg...
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
15 years 10 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
QSIC
2005
IEEE
15 years 10 months ago
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Haruhiko Kaiya, Motoshi Saeki
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 10 months ago
Static Analysis of XSLT Programs
XML is becoming the dominant standard for representing and exchanging data on the World Wide Web. The ability to transform and present data in XML is crucial and XSLT (Extensible ...
Ce Dong, James Bailey
129
Voted
ESOP
2004
Springer
15 years 10 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei