Sciweavers

1884 search results - page 51 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
SOFSEM
2010
Springer
13 years 6 months ago
Forcing Monotonicity in Parameterized Verification: From Multisets to Words
We present a tutorial on verification of safety properties for parameterized systems. Such a system consists of an arbitrary number of processes; the aim is to prove correctness of...
Parosh Aziz Abdulla
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ACSAC
2007
IEEE
14 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ADAEUROPE
2005
Springer
14 years 2 months ago
Using the AADL to Describe Distributed Applications from Middleware to Software Components
Distributed Real-Time (DRE) systems require the verification of their properties to ensure both reliability and conformance to initial requirements. Architecture description langu...
Thomas Vergnaud, Laurent Pautet, Fabrice Kordon
ICS
2010
Tsinghua U.
13 years 7 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...