Sciweavers

1398 search results - page 111 / 280
» Ensuring Properties of Interaction Systems
Sort
View
QSIC
2007
IEEE
15 years 10 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
ISESE
2005
IEEE
15 years 10 months ago
The use and usefulness of the ISO/IEC 9126 quality standard
This paper reports an evaluation the utility of ISO/IEC 9126. ISO/IEC 9126 is an international standard intended to ensure the quality of all software-intensive products including...
Hiyam Al-Kilidar, Karl Cox, Barbara Kitchenham
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
15 years 10 months ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka
126
Voted
IPPS
1996
IEEE
15 years 8 months ago
Efficient Run-Time Support for Irregular Task Computations with Mixed Granularities
Many irregular scientific computing problems can be modeled by directed acyclic task graphs (DAGs). In this paper, we present an efficient run-time system for executing general as...
Cong Fu, Tao Yang
CSFW
2004
IEEE
15 years 8 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith