Sciweavers

1821 search results - page 297 / 365
» Security-Aware Program Transformations
Sort
View
ICS
1993
Tsinghua U.
14 years 1 months ago
The EM-4 Under Implicit Parallelism
: The EM-4 is a supercomputer that offers very fast inter processor communication and support for multi threading. In this paper we demonstrate that the EM-4, Together with an auto...
Lubomir Bic, Mayez A. Al-Mouhamed
ECOOP
2007
Springer
14 years 26 days ago
Efficiently Generating Structurally Complex Inputs with Thousands of Objects
Abstract. We present Shekoosh, a novel framework for constraint-based generation of structurally complex inputs of large sizes. Given a Java predicate that represents the desired s...
Bassem Elkarablieh, Yehia Zayour, Sarfraz Khurshid
EMSOFT
2006
Springer
14 years 18 days ago
Polychronous mode automata
Among related synchronous programming principles, the model of computation of the Polychrony workbench stands out by its capability to give high-level description of systems where...
Jean-Pierre Talpin, Christian Brunette, Thierry Ga...
FATES
2006
Springer
14 years 18 days ago
Model-Based Testing of Thin-Client Web Applications
Abstract. More and more software systems use a browser as the universal graphical user interface. As a consequence these applications inherit browser navigation as part of their in...
Pieter W. M. Koopman, Rinus Plasmeijer, Peter Acht...
TOOLS
1998
IEEE
14 years 15 days ago
Designing Persistent Object-Oriented Software Architectures
Conventional object-oriented analysis delivers a business object model, which is transformed during design into collaborating class clusters which implement the business model...
Paul Taylor