Sciweavers

2043 search results - page 405 / 409
» Reasoning About Security Models
Sort
View
153
Voted
SAC
2005
ACM
15 years 10 months ago
A case study on building COTS-based system using aspect-oriented programming
More and more software projects are using COTS (Commercialoff-the-shelf) components. Using COTS components brings both advantages and risks. To manage some risks in using COTS com...
Axel Anders Kvale, Jingyue Li, Reidar Conradi
SEMWEB
2005
Springer
15 years 10 months ago
Rapid Benchmarking for Semantic Web Knowledge Base Systems
Abstract. We present a method for rapid development of benchmarks for Semantic Web knowledge base systems. At the core, we have a synthetic data generation approach for OWL that is...
Sui-Yu Wang, Yuanbo Guo, Abir Qasem, Jeff Heflin
ISSTA
2004
ACM
15 years 10 months ago
Exploiting purity for atomicity
The notion that certain procedures are atomic is a fundamental correctness property of many multithreaded software systems. A procedure is atomic if for every execution there is a...
Cormac Flanagan, Stephen N. Freund, Shaz Qadeer
FORMATS
2006
Springer
15 years 8 months ago
A Dose of Timed Logic, in Guarded Measure
We consider interval measurement logic IML, a sublogic of Zhou and Hansen's interval logic, with measurement functions which provide real-valued measurement of some aspect of ...
Kamal Lodaya, Paritosh K. Pandya
222
Voted
CAV
2003
Springer
188views Hardware» more  CAV 2003»
15 years 8 months ago
Thread-Modular Abstraction Refinement
odular Abstraction Refinement Thomas A. Henzinger1 , Ranjit Jhala1 , Rupak Majumdar1 , and Shaz Qadeer2 1 University of California, Berkeley 2 Microsoft Research, Redmond Abstract....
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...