Sciweavers

371 search results - page 54 / 75
» Causal Program Slicing
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
COMPSAC
2007
IEEE
14 years 3 months ago
Using Aspect Orientation in Understanding Legacy COBOL Code
Understanding and maintaining legacy COBOL systems are still a challenging task for both academic research and industry practice. With the development of aspect-oriented software ...
Jianjun Pu, Zhuopeng Zhang, Jian Kang, Yang Xu, Ho...
DBPL
2007
Springer
100views Database» more  DBPL 2007»
14 years 3 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar
KBSE
2003
IEEE
14 years 2 months ago
Semi-Automatic Fault Localization and Behavior Verification for Physical System Simulation Models
Mathematical modeling and simulation of complex physical systems are emerging as key technologies in engineering. Modern approaches to physical system simulation allow users to sp...
Peter Bunus, Peter Fritzson
FMCO
2003
Springer
102views Formal Methods» more  FMCO 2003»
14 years 2 months ago
Preserving Properties Under Change
In this paper we discuss the question which properties of a formally verified component are preserved when the component is changed due to an adaption to a new use. More specific...
Heike Wehrheim