Isolating untrusted software extensions by custom scoping rules.
Philip W. L. FongSimon A. OrrPublished in: Comput. Lang. Syst. Struct. (2010)
Keyphrases
- software tools
- software development
- software systems
- software design
- computer systems
- third party
- genetic algorithm
- data mining tools
- software projects
- rule sets
- software architecture
- domain specific
- data sets
- classification rules
- test cases
- software components
- user interface
- personal computer
- association rules
- software developers
- software maintenance
- learning classifier systems
- expert systems
- software package
- software platform