Sciweavers

1700 search results - page 145 / 340
» Specifying and implementing refactorings
Sort
View
161
Voted
VLDB
1998
ACM
141views Database» more  VLDB 1998»
15 years 9 months ago
Bulk-Loading Techniques for Object Databases and an Application to Relational Data
We present a framework for designing, in a declarative and flexible way, efficient migration programs and an undergoing implementation of a migration tool called RelOO whose targe...
Sihem Amer-Yahia, Sophie Cluet, Claude Delobel
121
Voted
KBSE
1997
IEEE
15 years 9 months ago
Precise Specification and Automatic Application of Design Patterns
Despite vast interest in design patterns, the specification and application of patterns is generally assumed to rely on manual implementation. We describe a precise method of spec...
Amnon H. Eden, Amiram Yehudai, Joseph Gil
136
Voted
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 9 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
149
Voted
EUROMICRO
1996
IEEE
15 years 9 months ago
Efficient Program Composition on Parix by the Ensemble Methodology
A message passing program composition methodology, called Ensemble, applied for Parix is presented. Ensemble overcomes the implementation problems and complexities in developing a...
John Yiannis Cotronis
HPDC
1996
IEEE
15 years 9 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw