Sciweavers

1821 search results - page 110 / 365
» Security-Aware Program Transformations
Sort
View
ASWEC
2006
IEEE
14 years 3 months ago
Derivation of Java Monitors
This paper describes the formalisation of Java thread synchronisation in an extended Owicki-Gries theory, which facilitates the proof of safety and progress properties of multi-th...
Brijesh Dongol
ANSS
2000
IEEE
14 years 1 months ago
Simulation of a Telecommunication System Using SimML
The cost of building a new system is usually quite high and without a proper design, a mismatch might occur between the proposed system and the actual system delivered. One aspect...
Neil A. Speirs, L. B. Arief
CC
1998
Springer
134views System Software» more  CC 1998»
14 years 1 months ago
Flow Logics for Constraint Based Analysis
Abstract. Flow logic offers a compact and versatile notation for expressing the acceptability of solutions to program analysis problems. In contrast to previous logical formulation...
Hanne Riis Nielson, Flemming Nielson
LISP
1998
88views more  LISP 1998»
13 years 8 months ago
Visualizing Evaluation in Scheme
Abstract. RainbowScheme is a visual stepping system that presents Scheme program’s runtime state using icons, colored environment trees, and colored Scheme code. A Scheme program...
Sho-Huan Simon Tung
ICFP
2006
ACM
14 years 9 months ago
Programming monads operationally with Unimo
Monads are widely used in Haskell for modeling computational effects, but defining monads remains a daunting challenge. Since every part of a monad's definition depends on it...
Chuan-Kai Lin