Sciweavers

2763 search results - page 14 / 553
» The Dangerous 'All' in Specifications
Sort
View
CCS
2009
ACM
13 years 12 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
POPL
2008
ACM
14 years 8 months ago
Semantics of transactional memory and automatic mutual exclusion
Software Transactional Memory (STM) is an attractive basis for the development of language features for concurrent programming. However, the semantics of these features can be del...
Andrew Birrell, Martín Abadi, Michael Isard...
CAISE
2005
Springer
14 years 1 months ago
A Semiotic Approach to UML models
In this paper we are trying to clarify, with the aid of some semiotic notions, the confusions that lie around the widely used terms “analysis model” and “design model” in s...
Gonzalo Génova, María Cruz Valiente,...
ACMSE
2004
ACM
14 years 1 months ago
A model-driven approach for generating embedded robot navigation control software
Real-time embedded systems are time-critical systems that are hard to implement as compared to traditional commercial software, due to the large number of conflicting requirements...
Bina Shah, Rachael Dennison, Jeff Gray
CIA
2008
Springer
13 years 9 months ago
Towards a Monitoring Framework for Agent-Based Contract Systems
The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a means...
Noura Faci, Sanjay Modgil, Nir Oren, Felipe Rech M...