Sciweavers

360 search results - page 45 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
AMAST
2004
Springer
13 years 11 months ago
Linear Temporal Logic and Z Refinement
Since Z, being a state-based language, describes a system in terms of its state and potential state changes, it is natural to want to describe properties of a specified system also...
John Derrick, Graeme Smith
ICFP
2010
ACM
13 years 8 months ago
A certified framework for compiling and executing garbage-collected languages
We describe the design, implementation, and use of a machinecertified framework for correct compilation and execution of programs in garbage-collected languages. Our framework ext...
Andrew McCreight, Tim Chevalier, Andrew P. Tolmach
ECWEB
2004
Springer
148views ECommerce» more  ECWEB 2004»
14 years 1 months ago
OCL-Constraints for UMM Business Collaborations
Abstract. Recently, a trend towards business processes in Business-toBusiness e-Commerce (B2B) is apparent. One of the most promising approaches is UN/CEFACT’s modeling methodolo...
Birgit Hofreiter, Christian Huemer, Werner Winiwar...
OOPSLA
2007
Springer
14 years 2 months ago
Detection and correction of design defects in object-oriented designs
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Naouel Moha
ICFP
2010
ACM
13 years 8 months ago
ReCaml: execution state as the cornerstone of reconfigurations
Most current techniques fail to achieve the dynamic update of recursive functions. A focus on execution states appears to be essential in order to implement dynamic update in this...
Jérémy Buisson, Fabien Dagnat