Sciweavers

182 search results - page 20 / 37
» Static program transformations for efficient software model ...
Sort
View
SIGSOFT
2008
ACM
16 years 14 days ago
Modular verification of web services using efficient symbolic encoding and summarization
We propose a novel method for modular verification of web service compositions. We first use symbolic fixpoint computations to derive conditions on the incoming messages and relat...
Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan
SCAM
2003
IEEE
15 years 5 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
CCS
2008
ACM
15 years 1 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
SIGSOFT
2003
ACM
16 years 14 days ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
EMSOFT
2001
Springer
15 years 4 months ago
An Implementation of Scoped Memory for Real-Time Java
Abstract. This paper presents our experience implementing the memory management extensions in the Real-Time Specification for Java. These extensions are designed to given real-tim...
William S. Beebee, Martin C. Rinard