Sciweavers

12745 search results - page 2390 / 2549
» Automating test automation
Sort
View
LICS
2008
IEEE
15 years 10 months ago
Reachability Games and Game Semantics: Comparing Nondeterministic Programs
We investigate the notions of may- and mustapproximation in Erratic Idealized Algol (a nondeterministic extension of Idealized Algol), and give explicit characterizations of both ...
Andrzej S. Murawski
LICS
2008
IEEE
15 years 10 months ago
Collapsible Pushdown Automata and Recursion Schemes
Collapsible pushdown automata (CPDA) are a new kind of higher-order pushdown automata in which every symbol in the stack has a link to a stack situated somewhere below it. In addi...
Matthew Hague, Andrzej S. Murawski, C.-H. Luke Ong...
149
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 10 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
146
Voted
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 10 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
« Prev « First page 2390 / 2549 Last » Next »