Sciweavers

160 search results - page 21 / 32
» Software Manipulation with Annotations in Java
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
ICSE
2011
IEEE-ACM
13 years 5 days ago
Unifying execution of imperative and declarative code
We present a unified environment for running declarative specifications in the context of an imperative object-oriented programming language. Specifications are Alloy-like, wri...
Aleksandar Milicevic, Derek Rayside, Kuat Yessenov...
ICSE
2001
IEEE-ACM
14 years 1 months ago
JMOCHA: A Model Checking Tool that Exploits Design Structure
Mocha is a model checker based on the theme of exploiting design modularity: instead of manipulating unstructured state-transition graphs, it supports the hierarchical modeling fra...
Rajeev Alur, Luca de Alfaro, Radu Grosu, Thomas A....
AOSD
2009
ACM
14 years 20 days ago
Flexible calling context reification for aspect-oriented programming
Aspect-oriented programming (AOP) eases the development of profilers, debuggers, and reverse engineering tools. Such tools frequently rely on calling context information. However,...
Alex Villazón, Walter Binder, Philippe More...
DRM
2003
Springer
14 years 1 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon