Sciweavers

2004 search results - page 273 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
160
Voted
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 10 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
EUROSYS
2006
ACM
16 years 1 months ago
Thorough static analysis of device drivers
Bugs in kernel-level device drivers cause 85% of the system crashes in the Windows XP operating system [44]. One of the sources of these errors is the complexity of the Windows dr...
Thomas Ball, Ella Bounimova, Byron Cook, Vladimir ...
ACL
2007
15 years 6 months ago
Generating a Table-of-Contents
This paper presents a method for the automatic generation of a table-of-contents. This type of summary could serve as an effective navigation tool for accessing information in lon...
S. R. K. Branavan, Pawan Deshpande, Regina Barzila...
FMCAD
2004
Springer
15 years 9 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore