Sciweavers

1821 search results - page 200 / 365
» Security-Aware Program Transformations
Sort
View
IHIS
2005
ACM
14 years 2 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
SAC
2005
ACM
14 years 2 months ago
A two-dimensional separation of concerns for compiler construction
During language evolution, compiler construction is usually d along two dimensions: defining new abstract syntax tree (AST) classes, or adding new operations. In order to facilita...
Xiaoqing Wu, Suman Roychoudhury, Barrett R. Bryant...
SIGADA
2005
Springer
14 years 2 months ago
Temporal skeletons for verifying time
This paper presents an intermediate notation used in a framework for verification of real-time properties. The framework aims at overcoming the need for the framework user to hav...
Gustaf Naeser, Kristina Lundqvist, Lars Asplund
AOSD
2008
ACM
13 years 11 months ago
AspectT: aspect-oriented test case instantiation
e instantiation is the transformation of abstract test cases cutable test scripts. Abstract test cases are either created during model based test case generation or are manually d...
Sebastian Benz
CL
2010
Springer
13 years 9 months ago
SystemJ: A GALS language for system level design
In this paper we present the syntax, semantics, and compilation of a new system-level programming language called SystemJ. SystemJ is a multiclock language supporting the Globally...
Avinash Malik, Zoran Salcic, Partha S. Roop, Alain...