Sciweavers

360 search results - page 54 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 1 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
AGENTCL
2000
Springer
14 years 8 days ago
What Is a Conversation Policy?
In this paper we define the concept of conversation policies: declarative specifications that govern communications between software agents using an agent communication language. ...
Mark Greaves, Heather Holmback, Jeffrey Bradshaw
HPDC
1999
IEEE
14 years 6 days ago
A Resource Description Environment for Distributed Computing Systems
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
Matthias Brune, Alexander Reinefeld, Jörg Var...
POPL
2011
ACM
12 years 10 months ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
ECOOP
2007
Springer
13 years 12 months ago
Non-null References by Default in Java: Alleviating the Nullity Annotation Burden
With the advent of Java 5 annotations, we note a marked increase in the availability of tools that can statically detect potential null dereferences. For such tools to be truly eff...
Patrice Chalin, Perry R. James