Sciweavers

454 search results - page 60 / 91
» Visualization of Program Dependence Graphs
Sort
View
SIGSOFT
2008
ACM
14 years 10 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ECOOPWEXCEPTION
2000
Springer
14 years 2 months ago
Portable Implementation of Continuation Operators in Imperative Languages by Exception Handling
Abstract. This paper describes a scheme of manipulating (partial) continuations in imperative languages such as Java and C++ in a portable manner, where the portability means that ...
Tatsurou Sekiguchi, Takahiro Sakamoto, Akinori Yon...
IJCAI
2007
13 years 11 months ago
A Machine Learning Approach for Statistical Software Testing
Some Statistical Software Testing approaches rely on sampling the feasible paths in the control flow graph of the program; the difficulty comes from the tiny ratio of feasible p...
Nicolas Baskiotis, Michèle Sebag, Marie-Cla...
SCP
2010
123views more  SCP 2010»
13 years 4 months ago
Slicing for architectural analysis
Current software development often relies on non trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such ...
Nuno F. Rodrigues, Luís Soares Barbosa
APWEB
2005
Springer
14 years 3 months ago
A Pattern Restore Method for Restoring Missing Patterns in Server Side Clickstream Data
Abstract. When analyzing patterns in server side data, it becomes quickly apparent that some of the data originating from the client is lost, mainly due to the caching of web pages...
I-Hsien Ting, Chris Kimble, Daniel Kudenko