Sciweavers

1528 search results - page 139 / 306
» Performance Assertion Checking
Sort
View
LISP
2008
97views more  LISP 2008»
15 years 2 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
135
Voted
ECEASST
2008
84views more  ECEASST 2008»
15 years 2 months ago
An Incremental OCL Compiler for Modeling Environments
In software engineering, reliability and development time are two of the most important aspects, therefore, modeling environments, which aide both, are widely used during software ...
Tamás Vajk, Gergely Mezei, Tihamer Levendov...
FC
2010
Springer
145views Cryptology» more  FC 2010»
15 years 1 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
140
Voted
ISOLA
2010
Springer
15 years 28 days ago
Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns
Abstract. This article deals with performance verifications of architecture models of real-time embedded systems. We focus on models verified with the real-time scheduling theory...
Alain Plantec, Frank Singhoff, Pierre Dissaux, J&e...
130
Voted
GPCE
2009
Springer
15 years 8 days ago
Generating safe template languages
Template languages are widely used within generative programming, because they provide intuitive means to generate software artefacts expressed in a specific object language. Howe...
Florian Heidenreich, Jendrik Johannes, Mirko Seife...