Sciweavers

620 search results - page 93 / 124
» Abstract Analysis of Symbolic Executions
Sort
View
145
Voted
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CSMR
2011
IEEE
14 years 7 months ago
Software Maintenance Research in the PROGRESS Project for Predictable Embedded Software Systems
Abstract—PROGRESS is a project and strategic research centre at M¨alardalen University in Sweden that is funded for 2006– 2010 by the Swedish Foundation for Strategic Research...
Johan Kraft, Holger M. Kienle, Thomas Nolte, Ivica...
TAOSD
2010
15 years 2 months ago
Aspect-Oriented Development Using Protocol Modeling
Abstract. The aim of this paper is to explore the modeling of crosscutavioral abstractions. We argue that behavioral aspects can be a particular kind of more general behavioral abs...
Ashley T. McNeile, Ella E. Roubtsova
ICSE
2007
IEEE-ACM
16 years 4 months ago
Is Code Still Moving Around? Looking Back at a Decade of Code Mobility
In the mid-nineties, mobile code was on the rise and, in particular, there was a growing interest in autonomously moving code components, called mobile agents. In 1997, we publish...
Antonio Carzaniga, Gian Pietro Picco, Giovanni Vig...
138
Voted
SAMOS
2009
Springer
15 years 10 months ago
An Embrace-and-Extend Approach to Managing the Complexity of Future Heterogeneous Systems
Abstract. In this paper, we present a particularly lightweight, integrative approach to programming and executing applications targeting heterogeneous, dynamically reconfigurable ...
Rainer Buchty, Mario Kicherer, David Kramer, Wolfg...