Sciweavers

790 search results - page 88 / 158
» A Model Checking Language for Concurrent Value-Passing Syste...
Sort
View
146
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
110
Voted
SAC
2008
ACM
15 years 3 months ago
Using simplified event calculus in digital investigation
In a hypothesis-based approach to digital investigation, the investigator formulates his hypothesis about which events took place, and tests them using the evidence available. A f...
Svein Yngvar Willassen
BIRTHDAY
2006
Springer
15 years 7 months ago
Data Flow Analysis for CCS
Data Flow Analysis as expressed by Monotone Frameworks is often associated with classical imperative programming languages and has played a crucial role in the efficient implementa...
Hanne Riis Nielson, Flemming Nielson
84
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Atomicity and visibility in tiny embedded systems
Visibility is a property of a programming language’s memory model that determines when values stored by one concurrent computation become visible to other computations. Our work...
John Regehr, Nathan Cooprider, David Gay
64
Voted
IFE
2002
69views more  IFE 2002»
15 years 3 months ago
Generierung interaktiver Animationen von Berechnungsmodellen
In this article we introduce two new generative approaches of animated computational models. These approaches are applied in context of educational software systems for compiler de...
Stephan Diehl, Andreas Kerren