Sciweavers

360 search results - page 44 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 8 months ago
Constructing Active Architectures in the ArchWare ADL
Software that cannot change is condemned to atrophy: it cannot accommodate the constant revision and renegotiation of its business goals nor intercept the potential of new technol...
Ronald Morrison, Graham N. C. Kirby, Dharini Balas...
ICFP
2009
ACM
14 years 8 months ago
Biorthogonality, step-indexing and compiler correctness
We define logical relations between the denotational semantics of a simply typed functional language with recursion and the operational behaviour of low-level programs in a varian...
Nick Benton, Chung-Kil Hur
ASPLOS
2011
ACM
12 years 11 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
IBERAMIA
2004
Springer
14 years 1 months ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
ISSRE
2000
IEEE
14 years 10 days ago
Can Intuition Become Rigorous? Foundations for UML Model Verification Tools
The Unified Modeling Language, UML, is the objectoriented notation adopted as the standard for objectoriented Analysis and Design by the Object Management Group. This paper report...
José Luis Fernández Alemán, J...