Sciweavers

715 search results - page 85 / 143
» Application of Formal Methods to the Development of a Softwa...
Sort
View
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
NLDB
2010
Springer
14 years 25 days ago
Automatic Quality Assessment of Source Code Comments: The JavadocMiner
Abstract. An important software engineering artefact used by developers and maintainers to assist in software comprehension and maintenance is source code documentation. It provide...
Ninus Khamis, René Witte, Juergen Rilling
IEEESCC
2008
IEEE
14 years 3 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
WSCG
2001
167views more  WSCG 2001»
13 years 10 months ago
Component-Based Architectures for Computer Vision Systems
Research performed in the field of computer vision has steadily ignored recent advances in programming tools and techniques, relying on well-established traditional methods, such ...
A. Economopoulos, Drakoulis Martakos
FASE
2004
Springer
14 years 2 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...