Sciweavers

473 search results - page 61 / 95
» Model Generation for Distributed Java Programs
Sort
View
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
14 years 1 months ago
Research, Development, and Demonstration Needs for Large-Scale, Reliability-Enhancing, Integration of Distributed Energy Resourc
Distributed energy resources (DER) are in transition from the lab to the marketplace. The defining characteristic of DER is that they are active devices installed at the distribut...
Joseph Eto, Vikram Budhraja, Carlos Martinez, Jim ...
AOSD
2007
ACM
14 years 1 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
NDSS
2003
IEEE
14 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
WSC
2008
13 years 11 months ago
A Pi-calculus formalism for discrete event simulation
This paper presents PiDES, a formalism for discrete event simulation based on Pi-calculus. PiDES provides a rigorous semantics of behavior modeling and coordination for simulation...
Jianrui Wang, Richard A. Wysk