Sciweavers

360 search results - page 48 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
SIGSOFT
2001
ACM
14 years 8 months ago
An architecture for flexible, evolvable process-driven user-guidance environments
Complex toolsets can be difficult to use. User interfaces can help by guiding users through the alternative choices that might be possible at any given time, but this tends to loc...
Timothy J. Sliski, Matthew P. Billmers, Lori A. Cl...
POPL
2008
ACM
14 years 8 months ago
Formal verification of translation validators: a case study on instruction scheduling optimizations
Translation validation consists of transforming a program and a posteriori validating it in order to detect a modification of its semantics. This approach can be used in a verifie...
Jean-Baptiste Tristan, Xavier Leroy
COMSIS
2007
80views more  COMSIS 2007»
13 years 8 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
ICFEM
1998
Springer
14 years 4 days ago
A Process Algebra Based Verification of a Production System
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to determine some characteristics of the system. Unfortunately, simulation also h...
J. J. T. Kleijn, J. E. Rooda, Michel A. Reniers
WORDS
2005
IEEE
14 years 1 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...