Sciweavers

1077 search results - page 59 / 216
» Introducing Software Engineering by means of Extreme Program...
Sort
View
TASE
2008
IEEE
15 years 3 months ago
An Extension to Pointer Logic for Verification
The safety of pointer programs is an important issue in high-assurance software design, and their verification remains a major challenge. Pointer Logic has been proposed to verify...
Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang,...
TOOLS
2008
IEEE
15 years 10 months ago
Component Reassembling and State Transfer in MaDcAr-Based Self-adaptive Software
In this paper, we introduce MaDcAr, a model of engines for dynamic and automatic (re)assembling of component-based software. In MaDcAr, an application description consists of the d...
Guillaume Grondin, Noury Bouraqadi, Laurent Vercou...
PEPM
2004
ACM
15 years 9 months ago
Program transformations for portable CPU accounting and control in Java
In this paper we introduce a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques at the bytecode level and can be use...
Jarle Hulaas, Walter Binder
TRUST
2010
Springer
15 years 9 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
CASCON
1993
117views Education» more  CASCON 1993»
15 years 5 months ago
Documenting-in-the-large vs. documenting-in-the-small
There is a signi cant di erence between documentinglarge programs and documenting small ones. By large programs we mean on the order of 1,000,000 lines, usually written by many di...
Scott R. Tilley