Sciweavers

709 search results - page 52 / 142
» Type Checking in XOBE
Sort
View
ICSE
1994
IEEE-ACM
15 years 8 months ago
Formalizing Architectural Connection
As software systems become more complex the overall system structure { or software architecture { becomes a central design problem. An important step towards an engineering discip...
Robert J. Allen, David Garlan
149
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
DAC
1991
ACM
15 years 7 months ago
REX - A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis
REX is a program that extracts parasitic resistance and capacitance values for nodes in VLSI layouts. REX also performs network serial and parallel simplifications. Two types of n...
Jerry P. Hwang
JOT
2010
113views more  JOT 2010»
15 years 2 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
SAS
2007
Springer
15 years 10 months ago
Refactoring Using Type Constraints
Type constraints express subtype-relationships between the types of program expressions that are required for type-correctness, and were originally proposed as a convenient framewo...
Frank Tip