Sciweavers

2276 search results - page 373 / 456
» Aspect-Oriented Requirements Engineering for Component-Based...
Sort
View
129
Voted
EUROSYS
2008
ACM
16 years 23 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
138
Voted
ISSTA
2004
ACM
15 years 9 months ago
An optimizing compiler for batches of temporal logic formulas
Model checking based on validating temporal logic formulas has proven practical and effective for numerous software engineering applications. As systems based on this approach ha...
James Ezick
124
Voted
CGO
2006
IEEE
15 years 7 months ago
Profiling over Adaptive Ranges
Modern computer systems are called on to deal with billions of events every second, whether they are instructions executed, memory locations accessed, or packets forwarded. This p...
Shashidhar Mysore, Banit Agrawal, Timothy Sherwood...
133
Voted
FASE
2008
Springer
15 years 5 months ago
Consistent Integration of Models Based on Views of Visual Languages
Abstract. The complexity of large system models in software engineering nowadays is mastered by using different views. View-based modeling aims at creating small, partial models, e...
Hartmut Ehrig, Karsten Ehrig, Claudia Ermel, Ulrik...
142
Voted
SIGADA
2004
Springer
15 years 9 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton