Sciweavers

3573 search results - page 535 / 715
» Reasoning about Codata
Sort
View
COMPSAC
2009
IEEE
15 years 4 months ago
Modular Certification of Low-Level Intermediate Representation Programs
Modular certification of low-level intermediate representation (IR) programs is one of the key steps of proof-transforming compilation. The major challenges are lexity of abstract ...
Yuan Dong, Shengyuan Wang, Liwei Zhang, Ping Yang
CONEXT
2009
ACM
15 years 4 months ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
ASWEC
2010
IEEE
15 years 3 months ago
On the Use of Properties in Java Applications
—When building software systems, developers have to weigh the benefits of using one specific solution approach against the risks and costs of using another one. This process is...
Markus Lumpe, Samrian Mahmud, Rajesh Vasa
366
Voted
JTRES
2010
ACM
15 years 3 months ago
The design of SafeJML, a specification language for SCJ with support for WCET specification
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear p...
Ghaith Haddad, Faraz Hussain, Gary T. Leavens
125
Voted
CAISE
2010
Springer
15 years 3 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...