Sciweavers

1027 search results - page 34 / 206
» Callgraph properties of executables
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 11 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
CAV
2007
Springer
227views Hardware» more  CAV 2007»
14 years 3 months ago
The TASM Toolset: Specification, Simulation, and Formal Verification of Real-Time Systems
Abstract. In this paper, we describe the features of the Timed Abstract State Machine toolset. The toolset implements the features of the Timed Abstract State Machine (TASM) langua...
Martin Ouimet, Kristina Lundqvist
JWSR
2008
98views more  JWSR 2008»
13 years 11 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
FUIN
2007
116views more  FUIN 2007»
13 years 11 months ago
Path Compression in Timed Automata
The paper presents a method of abstraction for timed systems. To extract an abstract model of a timed system we propose to use static analysis, namely a technique called path compr...
Agata Janowska, Wojciech Penczek
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
14 years 5 months ago
Space-time scaling laws for self-triggered control
— Feedback control laws have been traditionally treated as periodic tasks when implemented on digital platforms. However, the growing complexity of systems calls for efficient i...
Adolfo Anta Martinez, Paulo Tabuada