Sciweavers

4722 search results - page 18 / 945
» Encoding Program Executions
Sort
View
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
13 years 11 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
DATE
2004
IEEE
164views Hardware» more  DATE 2004»
13 years 11 months ago
System Design Using Kahn Process Networks: The Compaan/Laura Approach
New emerging embedded system platforms in the realm of highthroughput multimedia, imaging, and signal processing will consist of multiple microprocessors and reconfigurable compon...
Todor Stefanov, Claudiu Zissulescu, Alexandru Turj...
EPEW
2005
Springer
14 years 1 months ago
Executable Semantics for Compensating CSP
Compensation is an error recovery mechanism for long-running transactions. Compensating CSP is a variant of the CSP process algebra with constructs for orchestration of compensatio...
Michael J. Butler, Shamim Ripon
INFSOF
2002
126views more  INFSOF 2002»
13 years 7 months ago
Detection of dynamic execution errors in IBM system automation's rule-based expert system
We formally verify aspects of the rule-based expert system of IBM's System Automation software for IBM's zSeries mainframes. Starting with a formalization of the expert ...
Carsten Sinz, Thomas Lumpp, Jürgen M. Schneid...
TIT
2010
160views Education» more  TIT 2010»
13 years 2 months ago
Bounds on the rate of 2-D bit-stuffing encoders
A method for bounding the rate of bit-stuffing encoders for 2-D constraints is presented. Instead of considering the original encoder, we consider a related one which is quasistati...
Ido Tal, Ron M. Roth