Sciweavers

1700 search results - page 71 / 340
» Specifying and implementing refactorings
Sort
View
157
Voted
JSS
2006
153views more  JSS 2006»
15 years 4 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
SPE
2002
130views more  SPE 2002»
15 years 4 months ago
Unix tools as visual programming components in a GUI-builder environment
Development environments based on ActiveX controls and JavaBeans are marketed as "visual programming" platforms; in practice their visual dimension is limited to the des...
Diomidis Spinellis
INFOCOM
2012
IEEE
13 years 6 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
CASCON
1992
163views Education» more  CASCON 1992»
15 years 5 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
FMCAD
2007
Springer
15 years 10 months ago
Verifying Correctness of Transactional Memories
—We show how to verify the correctness of transactional memory implementations with a model checker. We show how to specify transactional memory in terms of the admissible interc...
Ariel Cohen 0002, John W. O'Leary, Amir Pnueli, Ma...