Sciweavers

3316 search results - page 178 / 664
» Mining Software Engineering Data
Sort
View
115
Voted
COMPSEC
2010
122views more  COMPSEC 2010»
15 years 5 days ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ADAEUROPE
2006
Springer
15 years 7 months ago
Static Detection of Access Anomalies in Ada95
In this paper we present data flow frameworks that are able to detect access anomalies in Ada multi-tasking programs. In particular, our approach finds all possible non-sequentia...
Bernd Burgstaller, Johann Blieberger, Robert Mitte...
98
Voted
UIST
1996
ACM
15 years 6 months ago
Adding Imageability Features to Information Displays
Techniques for improving the imageability of an existing data visualisation are described. The aim is to make the visualisation more easily explored, navigated and remembered. Sta...
Matthew Chalmers, Robert Ingram, Christoph Pfrange...
VMCAI
2010
Springer
15 years 11 months ago
Collections, Cardinalities, and Relations
Abstract. Logics that involve collections (sets, multisets), and cardinality constraints are useful for reasoning about unbounded data structures and concurrent processes. To make ...
Kuat Yessenov, Ruzica Piskac, Viktor Kuncak
107
Voted
VSTTE
2005
Springer
15 years 7 months ago
An Overview of Separation Logic
After some general remarks about program verification, we introduce separation logic, a novel extension of Hoare logic that can strengthen the applicability and scalability of pro...
John C. Reynolds