Sciweavers

437 search results - page 52 / 88
» Gradience, Constructions and Constraint Systems
Sort
View
SCAM
2008
IEEE
14 years 3 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
JITECH
2007
136views more  JITECH 2007»
13 years 9 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
MODELS
2007
Springer
14 years 3 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
IV
2002
IEEE
129views Visualization» more  IV 2002»
14 years 1 months ago
Design and Implementation of a Visual Query Language for Large Spatial Databases
In this paper a visual approach to querying in large spatial databases is presented. A diagrammatic technique utilising a data flow metaphor is used to express different kinds of...
Andrew J. Morris, Alia I. Abdelmoty, Douglas Tudho...