Sciweavers

1023 search results - page 41 / 205
» A Formal Method for Program Slicing
Sort
View
NSPW
1998
ACM
14 years 27 days ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
AFP
2008
Springer
245views Formal Methods» more  AFP 2008»
14 years 3 months ago
Self-adjusting Computation with Delta ML
Abstract. In self-adjusting computation, programs respond automatically and efficiently to modifications to their data by tracking the dynamic data dependences of the computation ...
Umut A. Acar, Ruy Ley-Wild
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 9 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
IJCAI
1993
13 years 10 months ago
Notes on Formalizing Context
These notes discuss formalizing contexts as first class objects. The basic relation is ist(c, p). It asserts that the proposition p is true in the context c. The most important f...
John McCarthy
ISSTA
2009
ACM
14 years 3 months ago
A formal analysis of requirements-based testing
The aim of requirements-based testing is to generate test cases from a set of requirements for a given system or piece of software. In this paper we propose a formal semantics for...
Charles Pecheur, Franco Raimondi, Guillaume Brat