Sciweavers

275 search results - page 30 / 55
» Reengineering Class Hierarchies Using Concept Analysis
Sort
View
FASE
2008
Springer
15 years 3 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ICSE
2001
IEEE-ACM
15 years 6 months ago
Fast Formal Analysis of Requirements via "Topoi Diagrams"
Early testing of requirements can decrease the cost of removing errors in software projects. However, unless done carefully, that testing process can significantly add to the cos...
Tim Menzies, John D. Powell, Michael E. Houle
JMIV
2002
152views more  JMIV 2002»
15 years 1 months ago
Shape Connectivity: Multiscale Analysis and Application to Generalized Granulometries
This paper develops a multiscale connectivity theory for shapes based on the axiomatic definition of new generalized connectivity measures, which are obtained using morphology-base...
Costas S. Tzafestas, Petros Maragos
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 8 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
ICDT
2007
ACM
185views Database» more  ICDT 2007»
15 years 8 months ago
Characterization of the Interaction of XML Functional Dependencies with DTDs
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
Lucja Kot, Walker M. White