Sciweavers

682 search results - page 71 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
ITICSE
2003
ACM
14 years 29 days ago
Studying program correctness by constructing contracts
Because the concept of program correctness is generally taught as an activity independent of the programming process, most introductory computer science (CS) students perceive it ...
Timothy S. Gegg-Harrison, Gary R. Bunce, Rebecca D...
VAMOS
2010
Springer
13 years 9 months ago
Using Collaborations to Encapsulate Features? An Explorative Study
A feature is a program characteristic visible to an end-user. Current research strives to encapsulate the implementation of a feature in a module. Jak is a language extension to Ja...
Martin Kuhlemann, Norbert Siegmund, Sven Apel
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
WCRE
2003
IEEE
14 years 29 days ago
Detecting Merging and Splitting using Origin Analysis
Merging and splitting source code artifacts is a common activity during the lifespan of a software system; as developers rethink the essential structure of a system or plan for a ...
Lijie Zou, Michael W. Godfrey
SAC
2008
ACM
13 years 7 months ago
A reusable object-oriented design to support self-testable autonomic software
As the enabling technologies of autonomic computing continue to advance, it is imperative for researchers to exchange the details of their proposed techniques for designing, devel...
Tariq M. King, Alain E. Ramirez, Peter J. Clarke, ...