Sciweavers

489 search results - page 82 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
106
Voted
ICFEM
2009
Springer
15 years 7 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
121
Voted
PLDI
2010
ACM
15 years 5 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
86
Voted
IUI
2004
ACM
15 years 5 months ago
What would they think?: a computational model of attitudes
A key to improving at any task is frequent feedback from people whose opinions we care about: our family, friends, mentors, and the experts. However, such input is not usually ava...
Hugo Liu, Pattie Maes
117
Voted
COMPUTER
2000
128views more  COMPUTER 2000»
15 years 8 days ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
87
Voted
AWIC
2003
Springer
15 years 5 months ago
Formalization of Web Design Patterns Using Ontologies
Design patterns have been enthusiastically embraced in the software engineering community as well as in the web community since they capture knowledge about how and when to apply a...
Susana Montero, Paloma Díaz, Ignacio Aedo