Sciweavers

529 search results - page 59 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
SBMF
2009
Springer
184views Formal Methods» more  SBMF 2009»
14 years 2 months ago
Concolic Testing of the Multi-sector Read Operation for Flash Memory File System
In today’s information society, flash memory has become a virtually indispensable component, particularly for mobile devices. In order for mobile devices to operate successfully...
Moonzoo Kim, Yunho Kim
DALT
2004
Springer
13 years 11 months ago
Modeling and Verification of Distributed Autonomous Agents Using Logic Programming
Systems of autonomous agents providing automated services over the Web are fast becoming a reality. Often these agent systems are constructed using procedural architectures that pr...
L. Robert Pokorny, C. R. Ramakrishnan
CCS
2006
ACM
13 years 11 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
CSFW
2006
IEEE
14 years 1 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers
ICSE
2008
IEEE-ACM
14 years 8 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....