Sciweavers

715 search results - page 81 / 143
» On Run-Time Enforcement of Policies
Sort
View
ENTCS
2010
107views more  ENTCS 2010»
13 years 7 months ago
PobSAM: Policy-based Managing of Actors in Self-Adaptive Systems
In this paper, we present a formal model, named PobSAM (Policy-based Self-Adaptive Model), for modeling self-adaptive systems. In this model, policies are used as a mechanism to d...
Narges Khakpour, Saeed Jalili, Carolyn L. Talcott,...
POPL
2002
ACM
14 years 8 months ago
Adaptive functional programming
An adaptive computation maintains the relationship between its input and output as the input changes. Although various techniques for adaptive computing have been proposed, they r...
Umut A. Acar, Guy E. Blelloch, Robert Harper
APN
2006
Springer
13 years 11 months ago
Nested Nets for Adaptive Systems
We consider nested nets, i.e. Petri nets in which tokens can be Petri nets themselves. We study value semantics of nested nets rather than reference semantics, and apply nested ne...
Kees M. van Hee, Irina A. Lomazova, Olivia Oanea, ...
NIPS
2008
13 years 9 months ago
Modeling the effects of memory on human online sentence processing with particle filters
Language comprehension in humans is significantly constrained by memory, yet rapid, highly incremental, and capable of utilizing a wide range of contextual information to resolve ...
Roger P. Levy, Florencia Reali, Thomas L. Griffith...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...