Sciweavers

568 search results - page 102 / 114
» Enforcing traceability in software
Sort
View
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 3 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
CBSE
2004
Springer
14 years 3 months ago
Correct Components Assembly for a Product Data Management Cooperative System
In this paper we report on a case study of correct automatic assembly of software components. We show the application of our tool (called Synthesis) for correct components assembly...
Massimo Tivoli, Paola Inverardi, Valentina Presutt...
INDIASE
2009
ACM
14 years 2 months ago
Automated review of natural language requirements documents: generating useful warnings with user-extensible glossaries driving
We present an approach to automating some of the quality assurance review of software requirements documents, and promoting best practices for requirements documentation. The syst...
Prateek Jain, Kunal Verma, Alex Kass, Reymonrod G....
CASES
2005
ACM
13 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...