Sciweavers

1715 search results - page 192 / 343
» Domain-Specific Program Checking
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 2 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ECOOP
2008
Springer
14 years 1 days ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
EMSOFT
2011
Springer
12 years 10 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
SIGSOFT
2007
ACM
14 years 11 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
WWW
2005
ACM
14 years 11 months ago
Using XForms to simplify Web programming
The difficulty of developing and deploying commercial web applications increases as the number of technologies they use increases and as the interactions between these technologie...
Richard Cardone, Danny Soroker, Alpana Tiwari