Sciweavers

489 search results - page 50 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
100
Voted
CSEE
2000
Springer
15 years 4 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...
100
Voted
BMCBI
2010
134views more  BMCBI 2010»
15 years 19 days ago
ScreenMill: A freely available software suite for growth measurement, analysis and visualization of high-throughput screen data
Background: Many high-throughput genomic experiments, such as Synthetic Genetic Array and yeast two-hybrid, use colony growth on solid media as a screen metric. These experiments ...
John C. Dittmar, Robert J. D. Reid, Rodney Rothste...
90
Voted
SCAM
2008
IEEE
15 years 6 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes
223
Voted
POPL
2008
ACM
16 years 24 days ago
Enhancing modular OO verification with separation logic
Conventional specifications for object-oriented (OO) programs must adhere to behavioral subtyping in support of class inheritance and method overriding. However, this requirement ...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
96
Voted
POLICY
2007
Springer
15 years 6 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...