Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2015
Runtime detection of business process compliance violations: an approach based on anti patterns
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 1203–1210https://doi.org/10.1145/2695664.2699488Today's enterprises demand a high degree of compliance in their business processes to meet diverse regulations and legislations. Several industrial studies have shown that compliance management is a daunting task, and organizations are still struggling ...
- short-paperApril 2015
Reconstruction of runtime software architecture for object-oriented systems
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 1668–1669https://doi.org/10.1145/2695664.2696070According to L. Bass et al. [8], software architecture of a system is "the set of structures needed to reason about the system, which comprise software elements, relations among them, and properties of both." Software architecture is often unavailable ...
- research-articleApril 2015
Runtime checking C programs
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 2107–2114https://doi.org/10.1145/2695664.2695906The C Programming Language is known for being an efficient language that can be compiled on almost any architecture and operating system. However the absence of dynamic safety checks and a relatively weak type system allows programmer oversights that ...
- research-articleApril 2015
Runtime enforcement for component-based systems
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 1789–1796https://doi.org/10.1145/2695664.2695879We propose a theoretical runtime enforcement framework for component-based systems (CBS) where we delineate a hierarchy of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed ...
- research-articleApril 2015
Fast as a shadow, expressive as a tree: hybrid memory monitoring for C
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 1765–1772https://doi.org/10.1145/2695664.2695815One classical approach to ensuring memory safety of C programs is based on storing block metadata in a tree-like datastructure. However it becomes relatively slow when the number of memory locations in the tree becomes high. Another solution, based on ...