Sciweavers

682 search results - page 128 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SASN
2006
ACM
14 years 1 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
FMICS
2009
Springer
14 years 2 months ago
A Rigorous Methodology for Composing Services
on Abstraction: a Lightweight Approach to Modelling Concurrency. Javier de Dios and Ricardo Peña Certified Implementation on top of the Java Virtual Machine 19:00 Social dinner + ...
Kenneth J. Turner, Koon Leai Larry Tan
PLDI
2010
ACM
14 years 4 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
ICSE
2010
IEEE-ACM
13 years 9 months ago
An exploratory study of fault-proneness in evolving aspect-oriented programs
This paper presents the results of an exploratory study on the fault-proneness of aspect-oriented programs. We analysed the faults collected from three evolving aspect-oriented sy...
Fabiano Cutigi Ferrari, Rachel Burrows, Otá...
SIGSOFT
2002
ACM
14 years 8 months ago
Negative scenarios for implied scenario elicitation
Scenario-based specifications such as Message Sequence Charts (MSCs) are popular for requirement elicitation and specification. MSCs describe two distinct aspects of a system: on ...
Sebastián Uchitel, Jeff Kramer, Jeff Magee