Sciweavers

427 search results - page 21 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
OOPSLA
2000
Springer
13 years 11 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
AGENTS
1999
Springer
13 years 11 months ago
A Methodology for Agent-Oriented Analysis and Design
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...
AAAI
1997
13 years 9 months ago
DISXPERT: A Social Security Disability Screening Expert System
This case study paper reports on the development and implementation of DISXPERT, a rule-based expert system tool for referral of social security disability recipients to vocationa...
James R. Nolan
CCS
2005
ACM
14 years 1 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
VMCAI
2004
Springer
14 years 26 days ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund