Sciweavers

360 search results - page 64 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
AMAST
2006
Springer
13 years 11 months ago
State Space Representation for Verification of Open Systems
Abstract. When designing an open system, there might be no implementation available for certain components at verification time. For such systems, verification has to be based on a...
Irem Aktug, Dilian Gurov
ACSAC
2010
IEEE
13 years 6 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
PPDP
2007
Springer
14 years 2 months ago
Mechanized metatheory model-checking
The problem of mechanically formalizing and proving metatheoretic properties of programming language calculi, type systems, operational semantics, and related formal systems has r...
James Cheney, Alberto Momigliano
ICSE
2009
IEEE-ACM
14 years 8 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
MICCAI
2004
Springer
14 years 8 months ago
An Event-Driven Framework for the Simulation of Complex Surgical Procedures
Existing surgical simulators provide a physical simulation that can help a trainee develop the hand-eye coordination and motor skills necessary for specific tasks, such as cutting ...
Christopher Sewell, Dan Morris, Nikolas H. Blevins...