Sciweavers

559 search results - page 87 / 112
» Dependency Inference
Sort
View
CSFW
2004
IEEE
14 years 13 days ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
AINA
2003
IEEE
14 years 10 days ago
Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
Condition Data Flow Diagrams (CDFDs) are a formalized notation resulting from the integration of Yourdon Data Flow Diagrams, Petri Nets, and pre-post notation. They are used in th...
Shaoying Liu
VL
1995
IEEE
176views Visual Languages» more  VL 1995»
14 years 7 days ago
The Visual Language of Experts in Graphic Design
Graphic designers and other visual problem solving experts now routinely use computer-based imageediting tools in their work. Recently, attempts have been made to apply learning a...
Henry Lieberman
LICS
1989
IEEE
14 years 5 days ago
Elf: A Language for Logic Definition and Verified Metaprogramming
We describe Elf, a metalanguage for proof manipulation environments that are independent of any particular logical system. Elf is intended for meta-programs such as theorem prover...
Frank Pfenning
C3S2E
2008
ACM
13 years 10 months ago
Context-sensitive cut, copy, and paste
Creating and editing source code are tedious and error-prone processes. One important source of errors in editing programs is the failure to correctly adapt a block of copied code...
Reid Kerr, Wolfgang Stürzlinger