Designers of embedded systems are facing ever tighter constraintson design time, but computer aided design tools for embedded systems have not kept pace with these trends. The Chi...
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
We present LM, a tool for mining scenario-based specifications in the form of Live Sequence Charts, a visual language that extends sequence diagrams with modalities. LM comes with...
Tuan-Anh Doan, David Lo, Shahar Maoz, Siau-Cheng K...
While Architecture Description Languages (ADLs) have gained wide acceptance in the research community as a means of describing system designs, the uptake in industry has been slow...
Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatri...