Sciweavers

1077 search results - page 185 / 216
» Introducing Software Engineering by means of Extreme Program...
Sort
View
OOPSLA
2007
Springer
15 years 8 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
ASPLOS
2008
ACM
15 years 3 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
ICCSA
2007
Springer
15 years 5 months ago
Component Specification for Parallel Coupling Infrastructure
Coupled systems comprise multiple interacting subsystems and are an increasingly common computational science application, most notably as multiscale and multiphysics models. Paral...
Jay Walter Larson, Boyana Norris
APSEC
2007
IEEE
15 years 8 months ago
An Executable UML with OCL-based Action Semantics Language
Executable UML allows precisely describing the softtem at a higher level of abstraction. It bridges the semantics gap between the UML design models and the implementation. The exe...
Ke Jiang, Lei Zhang, Shigeru Miyake
SEW
2003
IEEE
15 years 7 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...