Sciweavers

614 search results - page 100 / 123
» LCLint: A Tool for Using Specifications to Check Code
Sort
View
AICOM
2004
105views more  AICOM 2004»
13 years 7 months ago
Using WordNet for case-based retrieval of UML models
Software complexity has increased substantially in the last decade. This has made software development teams work faster and under tight budgets. Reusing software can be a way of s...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
INFSOF
2008
118views more  INFSOF 2008»
13 years 7 months ago
MARS: A metamodel recovery system using grammar inference
Domain-specific modeling (DSM) assists subject matter experts in describing the essential characteristics of a problem in their domain. Various software artifacts can be generated...
Faizan Javed, Marjan Mernik, Jeff Gray, Barrett R....
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SIGSOFT
2003
ACM
14 years 8 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg
NDSS
2007
IEEE
14 years 1 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...