Sciweavers

1700 search results - page 120 / 340
» Specifying and implementing refactorings
Sort
View
139
Voted
ENTCS
2006
153views more  ENTCS 2006»
15 years 5 months ago
Towards Model Transformation in Generated Eclipse Editor Plug-Ins
With the growing importance of model-driven development, the ability of transforming models into well-defined semantic domains becomes a key to automated code generation or verifi...
Karsten Ehrig, Claudia Ermel, Stefan Hänsgen
JCP
2006
106views more  JCP 2006»
15 years 4 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JSS
2006
99views more  JSS 2006»
15 years 4 months ago
Software architecture-based regression testing
When architecting dependable systems, in addition to improving system dependability by means of construction (fault-tolerant and redundant mechanisms, for instance), it is also im...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
SIGCSE
2008
ACM
136views Education» more  SIGCSE 2008»
15 years 4 months ago
A new paradigm for programming competitions
The annual ACM International Collegiate Programming Contest produces a competitive paradigm that is at odds with the pedagogical goals of modern computer science and software engi...
James F. Bowring
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 4 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks