Sciweavers

1911 search results - page 233 / 383
» Program analysis for code duplication in logic programs
Sort
View
AOSD
2010
ACM
15 years 12 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
ICLP
2005
Springer
15 years 10 months ago
Techniques for Scaling Up Analyses Based on Pre-interpretations
Any finite tree automaton (or regular type) can be used to construct act interpretation of a logic program, by first determinising and completing the automaton to get a pre-inter...
John P. Gallagher, Kim S. Henriksen, Gourinath Ban...
CSFW
2004
IEEE
15 years 8 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
ISSTA
2009
ACM
15 years 11 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
TII
2008
176views more  TII 2008»
15 years 4 months ago
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems
In wireless sensor networks each sensor node has very limited resources, and it is very difficult to find and collect them. For this reason, updating or adding programs in sensor n...
Sangho Yi, Hong Min, Yookun Cho, Jiman Hong