Sciweavers

1963 search results - page 14 / 393
» How is aliasing used in systems software
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
APSEC
2003
IEEE
14 years 1 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
CASCON
1997
93views Education» more  CASCON 1997»
13 years 9 months ago
Repairing software style using graph grammars
Often, software architects impose a particular style on the software systems they design. For large software systems, they would like to ensure that the design continues to confor...
Hoda Fahmy, Richard C. Holt, Spiros Mancoridis
ICTAC
2010
Springer
13 years 5 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
ICRA
2007
IEEE
107views Robotics» more  ICRA 2007»
14 years 2 months ago
Job-agents: How to coordinate them?
– With our proposed decomposition into layers, a generic framework leading to the reuse of previously produced software and the extraction of useful portions can be achieved. The...
Niak Wu Koh, Cezary Zielinski, Marcelo H. Ang, Ser...