Sciweavers

73 search results - page 13 / 15
» Composing Web-service-like abstract state machines (ASM)
Sort
View
COMPSAC
2005
IEEE
14 years 1 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
ATVA
2006
Springer
158views Hardware» more  ATVA 2006»
13 years 11 months ago
Model-Based Tool-Chain Infrastructure for Automated Analysis of Embedded Systems
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Hang Su, Graham Hemingway, Kai Chen, T. John Koo
FAC
2008
80views more  FAC 2008»
13 years 7 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
DATE
2007
IEEE
136views Hardware» more  DATE 2007»
14 years 1 months ago
Compositional specification of behavioral semantics
An emerging common trend in model-based design of embedded software and systems is the adoption of Domain-Specific Modeling Languages (DSMLs). While syntax metamodeling enables th...
Kai Chen 0003, Janos Sztipanovits, Sandeep Neema
ASM
2003
ASM
14 years 19 days ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer