Sciweavers

752 search results - page 38 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 1 months ago
Testing Design of a Social Innovation The Environmental Mitigation Banking System
This paper attempts to evaluate the performance of an environmental mitigation banking system operating under different regulatory. Pricing and subsidization policies using system...
Khalid Saeed, Atsushi Fukuda
HPCA
2005
IEEE
14 years 8 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
JCSS
2008
159views more  JCSS 2008»
13 years 8 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
SAM
2000
102views Hardware» more  SAM 2000»
13 years 9 months ago
Test Generation Based On Control And Data Dependencies Within Multi-Process SDL Specifications
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across...
Olaf Henniger, Hasan Ural
ICSE
1998
IEEE-ACM
14 years 21 days ago
Modeling and Analysis of a Virtual Reality System with Time Petri Nets
The design, implementation, and testing of virtual environments is complicated by the concurrency and realtime features of these systems. Therefore, the development of formal meth...
Rajesh Mascarenhas, Dinkar Karumuri, Ugo A. Buy, R...