Sciweavers

360 search results - page 56 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
AOSD
2011
ACM
13 years 2 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...
CADE
2005
Springer
14 years 8 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
PLDI
2010
ACM
14 years 15 hour ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
QSIC
2003
IEEE
14 years 1 months ago
A Dialog Control Framework for Hypertext-Based Applications
Hypertext-based user interfaces have become attractive for many distributed applications today, but they do not reach the usability level of window-based UIs. Because of insuffici...
Matthias Book, Volker Gruhn
ATAL
2007
Springer
13 years 12 months ago
A methodology for 3D electronic institutions
In this paper we propose a methodology for the construction of 3D electronic institutions. 3D electronic institutions are normative environments where software and human agents ca...
Anton Bogdanovych, Marc Esteva, Simeon J. Simoff, ...