Sciweavers

537 search results - page 32 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
POPL
2005
ACM
14 years 8 months ago
Dynamic partial-order reduction for model checking software
We present a new approach to partial-order reduction for model checking software. This approach is based on initially exploring an arbitrary interleaving of the various concurrent...
Cormac Flanagan, Patrice Godefroid
OOPSLA
2000
Springer
13 years 11 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang
FLAIRS
2006
13 years 9 months ago
Formal Verification of Cognitive Models
Cognitive modeling has outgrown the toy problems of the research labs and is increasingly tackling Industrial size applications. This growth is not matched in terms of software to...
A. MacKlem, Fatma Mili
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
LADC
2007
Springer
14 years 1 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández