Sciweavers

489 search results - page 54 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
96
Voted
KBSE
2009
IEEE
15 years 7 months ago
Inferring Method Effect Summaries for Nested Heap Regions
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice...
Mohsen Vakilian, Danny Dig, Robert L. Bocchino Jr....
COMPSAC
2003
IEEE
15 years 5 months ago
Effects of Introducing Survival Behaviours into Automated Negotiators
With the rise of distributed e-commerce in recent years, demand for automated negotiation has increased. In turn, this has facilitated a demand for ever more complex algorithms to...
Peter Henderson, Stephen Crouch, Robert John Walte...
GROUP
2007
ACM
15 years 4 months ago
Supporting collaborative software development through the visualization of socio-technical dependencies
One of the reasons large-scale software development is difficult is the number of dependencies that software engineers face. These dependencies create a need for communication and...
Cleidson R. B. de Souza, Stephen Quirk, Erik Train...
92
Voted
FASE
2009
Springer
15 years 4 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
78
Voted
ASWEC
2010
IEEE
15 years 22 days ago
On the Use of Properties in Java Applications
—When building software systems, developers have to weigh the benefits of using one specific solution approach against the risks and costs of using another one. This process is...
Markus Lumpe, Samrian Mahmud, Rajesh Vasa