Sciweavers

95 search results - page 16 / 19
» Conformance checking of service behavior
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 1 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
RTCSA
2006
IEEE
14 years 1 months ago
An RTOS API Translator for Model-Driven Embedded Software Development
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are two ...
Ji Chan Maeng, Jong-Hyuk Kim, Minsoo Ryu
GLOBECOM
2009
IEEE
14 years 2 months ago
ANTS - A Framework for Knowledge Based NAT Traversal
—Today most home networks are connected to the Internet via Network Address Translation (NAT) devices. NAT is an obstacle for services that should be accessible from the public I...
Andreas Müller, Andreas Klenk, Georg Carle
ICSE
2008
IEEE-ACM
14 years 8 months ago
Testing pervasive software in the presence of context inconsistency resolution services
Pervasive computing software adapts its behavior according to the changing contexts. Nevertheless, contexts are often noisy. Context inconsistency resolution provides a cleaner pe...
Heng Lu, W. K. Chan, T. H. Tse
BPM
2010
Springer
191views Business» more  BPM 2010»
13 years 8 months ago
Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis
Abstract. A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is sub...
Wil M. P. van der Aalst, Niels Lohmann, Marcello L...