Program information extracted from source codes is valuable for research in many software engineering fields. Many program analysis tools in these fields usually share some common...
Wanghong Yuan, X. Chen, Tao Xie, Hong Mei, Fuqing ...
: True integration of large systems requires sharing of information stored in databases beyond sharing of pure data: business rules associated with this data must be shared also. T...
Abstract. The hiding of internal invariants creates a mismatch between procedure specifications in an interface and proof obligations on the implementations of those procedures. T...
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...