Sciweavers

792 search results - page 118 / 159
» Static Analysis of XSLT Programs
Sort
View
122
Voted
ICSE
1999
IEEE-ACM
15 years 6 months ago
CHIME: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments
Source code browsing is an important part of program comprehension. Browsers expose semantic and syntactic relationships (such as between object references and definitions) in GU...
Premkumar T. Devanbu, Yih-Farn Chen, Emden R. Gans...
ICSM
2006
IEEE
15 years 8 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
COMPSAC
2009
IEEE
15 years 9 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
100
Voted
CSFW
2007
IEEE
15 years 9 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 6 months ago
Parametric and Sliced Causality
Abstract. Happen-before causal partial orders have been widely used in concurrent program verification and testing. This paper presents a parametric approach to happen-before causa...
Feng Chen, Grigore Rosu