Sciweavers

489 search results - page 82 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
ICFEM
2009
Springer
14 years 5 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
PLDI
2010
ACM
14 years 3 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
IUI
2004
ACM
14 years 3 months ago
What would they think?: a computational model of attitudes
A key to improving at any task is frequent feedback from people whose opinions we care about: our family, friends, mentors, and the experts. However, such input is not usually ava...
Hugo Liu, Pattie Maes
COMPUTER
2000
128views more  COMPUTER 2000»
13 years 10 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
AWIC
2003
Springer
14 years 3 months ago
Formalization of Web Design Patterns Using Ontologies
Design patterns have been enthusiastically embraced in the software engineering community as well as in the web community since they capture knowledge about how and when to apply a...
Susana Montero, Paloma Díaz, Ignacio Aedo