Sciweavers

272 search results - page 37 / 55
» context 1999
Sort
View
METRICS
1999
IEEE
14 years 2 months ago
Metrics for Quantifying the Disparity, Concentration, and Dedication between Program Components and Features
One of the most important steps towards effective software maintenance of a large complicated system is to understand how program features are spread over the entire system and th...
W. Eric Wong, Swapna S. Gokhale, Joseph Robert Hor...
ESOP
1999
Springer
14 years 2 months ago
Safe and Principled Language Interoperation
Safety of interoperation of program fragments written in different safe languages may fail when the languages have different systems of computational effects: an exception raised b...
Valery Trifonov, Zhong Shao
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
SRDS
1999
IEEE
14 years 2 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
FM
1999
Springer
161views Formal Methods» more  FM 1999»
14 years 2 months ago
On-the-Fly Controller Synthesis for Discrete and Dense-Time Systems
We present novel techniques for efficient controller synthesis for untimed and timed systems with respect to invariance and reachability properties. In the untimed case, we give al...
Stavros Tripakis, Karine Altisen