Sciweavers

5843 search results - page 152 / 1169
» Software Security in Practice
Sort
View
SEKE
2005
Springer
15 years 10 months ago
Formal Analysis of Workflow Systems with Security Considerations
Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi
SIGSOFT
2010
ACM
15 years 2 months ago
Software intelligence: the future of mining software engineering data
Mining software engineering data has emerged as a successful research direction over the past decade. In this position paper, we advocate Software Intelligence (SI) as the future ...
Ahmed E. Hassan, Tao Xie
PODC
2004
ACM
15 years 10 months ago
Bringing practical lock-free synchronization to 64-bit applications
Many lock-free data structures in the literature exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit operating systems an...
Simon Doherty, Maurice Herlihy, Victor Luchangco, ...
KBSE
1997
IEEE
15 years 8 months ago
Moving Proofs-As-Programs into Practice
Proofs in the Nuprl system, an implementation of a constructive type theory, yield “correct-by-construction” programs. In this paper a new methodology is presented for extract...
James L. Caldwell