Sciweavers

2602 search results - page 456 / 521
» Semantic Analysis of 'to'
Sort
View
ECOOP
1999
Springer
14 years 2 months ago
Inlining of Virtual Methods
We discuss aspects of inlining of virtual method invocations. First, we introduce a new method test to guard inlinings of such invocations, with a di erent set of tradeo s from the...
David Detlefs, Ole Agesen
LICS
1999
IEEE
14 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
KBSE
1998
IEEE
14 years 2 months ago
Specification-based Browsing of Software Component Libraries
Specification-based retrieval provides exact contentoriented access to component libraries but requires too much deductive power. Specification-based browsing evades this bottlene...
B. Fischer
FASE
1998
Springer
14 years 2 months ago
Specifying and Analyzing Dynamic Software Architectures
A critical issue for complex component-based systems design is the modeling and analysis of architecture. One of the complicating factors in developing architectural models is acc...
Robert Allen, Rémi Douence, David Garlan
ICSE
1998
IEEE-ACM
14 years 2 months ago
Integrating Architecture Description Languages with a Standard Design Method
Software architecture descriptions are high-level models of software systems. Some researchers have proposed specialpurpose architectural notations that have a great deal of expre...
Jason E. Robbins, Nenad Medvidovic, David F. Redmi...