Sciweavers

67 search results - page 6 / 14
» A Survey of Practical Software Adaptation Techniques
Sort
View
STORAGESS
2005
ACM
14 years 8 days ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
GCSE
2001
Springer
13 years 11 months ago
Base Class Injection
Abstract. Class hierarchies, though theoretically reusable, have generally not seen much practical reuse in applications, due in part to the inflexibility of the inheritance relat...
Douglas Gregor, Sibylle Schupp, David R. Musser
ICSE
2007
IEEE-ACM
14 years 6 months ago
Adaptive Online Program Analysis
Analyzing a program run can provide important insights about its correctness. Dynamic analysis of complex correctness properties, however, usually results in significant run-time ...
Matthew B. Dwyer, Alex Kinneer, Sebastian G. Elbau...
ICSE
2000
IEEE-ACM
13 years 10 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
ICSE
2000
IEEE-ACM
13 years 10 months ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini