Sciweavers

682 search results - page 72 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SIGSOFT
2010
ACM
13 years 5 months ago
Staged concurrent program analysis
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Nishant Sinha, Chao Wang
FSTTCS
2007
Springer
13 years 11 months ago
Efficient and Expressive Tree Filters
Abstract. We investigate streaming evaluation of filters on XML documents, evaluated both at the root node and at an arbitrary node. Motivated by applications in protocol processin...
Michael Benedikt, Alan Jeffrey
CADE
2005
Springer
14 years 8 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
IASTEDSEA
2004
13 years 9 months ago
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...
Victor L. Winter, Steve Roach, Fares Fraij
SEAA
2008
IEEE
14 years 2 months ago
Checking Session-Oriented Interactions between Web Services
Although web services are generally envisioned as being stateless, some of them are implicitly stateful. The reason is that the web services often work as front-ends to enterprise...
Pavel Parizek, Jirí Adámek