Sciweavers

197 search results - page 26 / 40
» Exploring Different Constraint-Based Modelings for Program V...
Sort
View
JCIT
2010
139views more  JCIT 2010»
13 years 2 months ago
Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model
This study explores the construction of an intermediary as a product knowledge-sharing system for design industry with the advanced features of the Extensible Markup Language (XML...
Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin
POPL
2008
ACM
14 years 7 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
KBSE
2009
IEEE
14 years 2 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
DAC
2011
ACM
12 years 7 months ago
Litmus tests for comparing memory consistency models: how long do they need to be?
Memory consistency litmus tests are small parallel programs that are designed to illustrate subtle differences between memory consistency models by exhibiting different outcomes...
Sela Mador-Haim, Rajeev Alur, Milo M. K. Martin