Sciweavers

1486 search results - page 153 / 298
» Firewall Rules Analysis
Sort
View
AI
2005
Springer
15 years 4 months ago
MaxSolver: An efficient exact algorithm for (weighted) maximum satisfiability
Maximum Boolean satisfiability (max-SAT) is the optimization counterpart of Boolean satisfiability (SAT), in which a variable assignment is sought to satisfy the maximum number of...
Zhao Xing, Weixiong Zhang
ASE
2011
14 years 8 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
PERCOM
2005
ACM
16 years 4 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
APSEC
2002
IEEE
15 years 9 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis
ICSE
2010
IEEE-ACM
15 years 9 months ago
LSdiff: a program differencing tool to identify systematic structural differences
Program differencing tools such as GNU diff identify individual differences but do not determine how those differences are related to each other. For example, an extract super...
Alex Loh, Miryung Kim