Sciweavers

224 search results - page 33 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 1 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
IJCAI
1993
13 years 8 months ago
A Model-Theoretic Approach to the Verification of Situated Reasoning Systems
agent-oriented system. We show the complexity to be linear time for one of these logics and polynomial time for another, thus providing encouraging results with respect to the prac...
Anand S. Rao, Michael P. Georgeff
ENTCS
2006
112views more  ENTCS 2006»
13 years 7 months ago
A Petri-Net Based Reflective Framework for the Evolution of Dynamic Systems
Nowadays, software evolution is a very hot topic. Many applications need to be updated or extended with new characteristics during their lifecycle. Software evolution is character...
Lorenzo Capra, Walter Cazzola
HASE
2002
IEEE
14 years 15 days ago
An Approach to Specify and Test Component-Based Dependable Software
Components (in-house or pre-fabricated) are increasingly being used to reduce the cost of software development. Given that these components may not have not been developed with de...
Arshad Jhumka, Martin Hiller, Neeraj Suri