Sciweavers

15885 search results - page 3099 / 3177
» Strategic Software Engineering
Sort
View
109
Voted
WWW
2003
ACM
16 years 3 months ago
Supporting Cooperative Activities with Shared Hypermedia Workspaces on the WWW
Team members usually cooperate on a business process by partitioning it into several activities, which in turn generate one or more work items. Work items either need to be proces...
Jörg M. Haake, Jessica Rubart, Weigang Wang
227
Voted
ICFP
2009
ACM
16 years 3 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
229
Voted
PLDI
2009
ACM
16 years 3 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
241
Voted
PLDI
2009
ACM
16 years 3 months ago
Semantics-aware trace analysis
As computer systems continue to become more powerful and comdo programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reas...
Kevin J. Hoffman, Patrick Eugster, Suresh Jagannat...
CCS
2009
ACM
16 years 3 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
« Prev « First page 3099 / 3177 Last » Next »