Sciweavers

1796 search results - page 280 / 360
» An Approach to Compositional Model Checking
Sort
View
CAV
2006
Springer
116views Hardware» more  CAV 2006»
13 years 12 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
RAID
2007
Springer
14 years 2 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
IPSN
2004
Springer
14 years 1 months ago
Constraint-guided dynamic reconfiguration in sensor networks
This paper presents an approach for dynamic software reconfiguration in sensor networks. Our approach utilizes explicit models of the design space of the embedded application. The...
Sachin Kogekar, Sandeep Neema, Brandon Eames, Xeno...
ICWS
2010
IEEE
13 years 9 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...
VIS
2004
IEEE
163views Visualization» more  VIS 2004»
14 years 9 months ago
Dispersion Simulation and Visualization For Urban Security
We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminan...
Arie E. Kaufman, Feng Qiu, Haik Lorenz, Jianning W...