Sciweavers

562 search results - page 60 / 113
» Attack graph generation and analysis
Sort
View
ECEASST
2010
13 years 5 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Exploring the Local Connectivity Preference in Internet AS Level Topology
—The Internet AS level topology, upon which BGP4 runs, plays a vital role in the analysis and study of the global routing behavior. However, the study of the topology itself is n...
Guoqiang Zhang, Guoqing Zhang
ISSS
1998
IEEE
104views Hardware» more  ISSS 1998»
14 years 4 hour ago
Synchronization Detection for Multi-Process Hierarchical Synthesis
Complex system specifications are often hierarchically composed of several subsystems. Each subsystem contains one or more processes. In order to provide optimization across diffe...
Oliver Bringmann, Wolfgang Rosenstiel, Dirk Reicha...
ICMAS
1998
13 years 9 months ago
Developing Formal Specifications to Coordinate Heterogeneous Autonomous Agents
We have been developing an approach for the distributed coordination of heterogeneous, autonomous agents. This approach takes as input (a) agent skeletons, giving compact descript...
Munindar P. Singh
JSS
2010
89views more  JSS 2010»
13 years 2 months ago
Verification and validation of declarative model-to-model transformations through invariants
In this paper we propose a method to derive OCL invariants from declarative model-to-model transformations in order to enable their verification and analysis. For this purpose we ...
Jordi Cabot, Robert Clarisó, Esther Guerra,...