Sciweavers

143 search results - page 21 / 29
» Data-Flow Analysis of Program Fragments
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
PROFES
2004
Springer
14 years 3 months ago
Refactoring Support Based on Code Clone Analysis
Abstract. Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software system...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
ATAL
2006
Springer
14 years 1 months ago
TANDEM - a design method for integrating web services into multi-agent systems
This paper introduces a new design method for multi-agent systems (MAS) that incorporate logic programming. The DigitalFriend is an example of a MAS with a built-in logic language...
Steve Goschnick, Sandrine Balbo, Leon Sterling, Ch...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
14 years 10 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
BMCBI
2010
86views more  BMCBI 2010»
13 years 9 months ago
ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite
Background: Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents...
Evgeniy V. Petrotchenko, Christoph H. Borchers