Sciweavers

372 search results - page 64 / 75
» On Codings of Traces
Sort
View
SERP
2003
13 years 8 months ago
A Vision for Product Traceability Based on Semantics of Artifacts
In the face of extensive attention form both the research community and the industry, traceability there still lacks of a supporting methodology that enables traceability througho...
Darijus Strasunskas
CL
2002
Springer
13 years 7 months ago
Orderly communication in the Ambient Calculus
The Ambient Calculus (henceforth, AC) was developed by Cardelli and Gordon as a formal framework to study issues of mobility and migrant code [9]. We present a type system for AC ...
Torben Amtoft, A. J. Kfoury, Santiago M. Peric&aac...
TSE
1998
93views more  TSE 1998»
13 years 7 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
INFOCOM
2010
IEEE
13 years 6 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
TON
2010
80views more  TON 2010»
13 years 5 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...