Sciweavers

612 search results - page 61 / 123
» Division for Foundation of Software
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
115
Voted
SAC
2005
ACM
15 years 9 months ago
Learning system to introduce GIS to civil engineers
: A learning system to facilitate the integration of Geographical Information Systems (GIS) into the Civil Engineering curriculum is described in this paper. The principal learning...
Ronaldo Luna, William T. Lawrence, John M. Sulliva...
CASES
2010
ACM
15 years 2 months ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau
SIGSOFT
2004
ACM
16 years 4 months ago
Heuristic-guided counterexample search in FLAVERS
One of the benefits of finite-state verification (FSV) tools, such as model checkers, is that a counterexample is provided when the property cannot be verified. Not all counterexa...
Jianbin Tan, George S. Avrunin, Lori A. Clarke, Sh...
IWPSE
2003
IEEE
15 years 9 months ago
Using Coordination Contracts for Flexible Adaptation to Changing Business Rules
This paper reports on the use of coordination contracts, presented at the previous two IWPSE workshops, in a project for a credit recovery company. We have designed and implemente...
Michel Wermelinger, Georgios Koutsoukos, Richard A...