Sciweavers

1821 search results - page 277 / 365
» Security-Aware Program Transformations
Sort
View
SAS
2005
Springer
15 years 6 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken
127
Voted
UML
2005
Springer
15 years 6 months ago
Refactoring OCL Annotated UML Class Diagrams
Refactoring of UML class diagrams is an emerging research topic and heavily inspired by refactoring of program code written in object-oriented implementation languages. Current cla...
Slavisa Markovic, Thomas Baar
EUROSPI
2004
Springer
15 years 6 months ago
Discovering the Relation Between Project Factors and Project Success in Post-mortem Evaluations
Post-mortem project reviews often yield useful lessons learned. These project reviews are mostly recorded in plain text. This makes it difficult to derive useful overall findings ...
Joost J. P. Schalken, Sjaak Brinkkemper, Hans van ...
FLOPS
2004
Springer
15 years 6 months ago
Semantics of Linear Continuation-Passing in Call-by-Name
We propose a semantic framework for modelling the linear usage of continuations in typed call-by-name programming languages. On the semantic side, we introduce a construction for c...
Masahito Hasegawa
103
Voted
ICT
2004
Springer
143views Communications» more  ICT 2004»
15 years 6 months ago
A Generic Event-Driven System for Managing SNMP-Enabled Communication Networks
In the area of monitoring communication networks, GEDSystem is a tool for supporting the development of programs driven to the management of domains that may show up when networks ...
Aécio Paiva Braga, Riverson Rios, Rossana M...