Sciweavers

2429 search results - page 250 / 486
» Using Aspects to Design a Secure System
Sort
View
CACM
2006
95views more  CACM 2006»
15 years 3 months ago
Computational thinking
ional thinking is using abstraction and decomposition when attacking a large complex task or designing a large complex system. It is separation of concerns. It is choosing an appro...
Jeannette M. Wing
111
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems
The use of component models such as Enterprise Java Beans and the CORBA Component Model (CCM) in application development is expanding rapidly. Even in real-time safety/mission-cri...
John Hatcliff, Xianghua Deng, Matthew B. Dwyer, Ge...
150
Voted
ICSE
2000
IEEE-ACM
15 years 7 months ago
Integrating UML diagrams for production control systems
This paper proposes to use SDL block diagrams, UML class diagrams, and UML behavior diagrams like collaboration diagrams, activity diagrams, and statecharts as a visual programmin...
Hans J. Köhler, Ulrich Nickel, Jörg Nier...
SOSP
2009
ACM
16 years 7 days ago
Automatically patching errors in deployed software
We present ClearView, a system for automatically patching errors in deployed software. ClearView works on stripped Windows x86 binaries without any need for source code, debugging...
Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman...
145
Voted
IMC
2010
ACM
15 years 1 months ago
Measuring the mixing time of social graphs
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim