Sciweavers

16725 search results - page 3211 / 3345
» Engineering Software Correctness
Sort
View
155
Voted
CCS
2011
ACM
14 years 2 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
126
Voted
CIKM
2011
Springer
14 years 2 months ago
Ranking-based processing of SQL queries
A growing number of applications are built on top of search engines and issue complex structured queries. This paper contributes a customisable ranking-based processing of such qu...
Hany Azzam, Thomas Roelleke, Sirvan Yahyaei
110
Voted
BIRTHDAY
2012
Springer
13 years 10 months ago
Model Transformation By-Example: A Survey of the First Wave
Abstract. Model-Driven Engineering (MDE) places models as firstclass artifacts throughout the software lifecycle. In this context, model transformations are crucial for the succes...
Gerti Kappel, Philip Langer, Werner Retschitzegger...
134
Voted
PPOPP
2012
ACM
13 years 10 months ago
Concurrent breakpoints
In program debugging, reproducibility of bugs is a key requirement. Unfortunately, bugs in concurrent programs are notoriously difficult to reproduce because bugs due to concurre...
Chang-Seo Park, Koushik Sen
91
Voted
GI
2003
Springer
15 years 7 months ago
C versus Ada in sicherheitskritischen Applikationen
: In Zukunft wird es verstärkt notwendig sein, sicherheitskritische Systeme statt in Ada in der Programmiersprache C zu implementieren. Die Verwendung von C ist getrieben vom Mang...
Michael Jungmann
« Prev « First page 3211 / 3345 Last » Next »