Sciweavers

360 search results - page 62 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
POPL
2008
ACM
14 years 8 months ago
Relational inductive shape analysis
alyses are concerned with precise abstractions of the heap to capture detailed structural properties. To do so, they need to build and decompose summaries of disjoint memory regio...
Bor-Yuh Evan Chang, Xavier Rival
SAC
2009
ACM
14 years 2 months ago
LTS semantics for use case models
Formalization is a necessary precondition for the specification of precise and unambiguous use case models, which serve as reference points for the design and implementation of so...
Daniel Sinnig, Patrice Chalin, Ferhat Khendek
FDL
2005
IEEE
14 years 1 months ago
Mixing Synchronous Reactive and Untimed Models of Computation
The support of heterogeneity at the specification level, that is, the ability to mix several models of computation (MoCs) in the system-level specification, is becoming increasing...
Fernando Herrera, Eugenio Villar
FAST
2004
13 years 9 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
SEKE
2004
Springer
14 years 1 months ago
Grammatically Interpreting Feature Compositions
Feature modeling is a popular domain analysis method for describing the commonality and variability among the domain products. The current formalisms of feature modelling do not ha...
Wei Zhao, Barrett R. Bryant, Fei Cao, Rajeev R. Ra...