Sciweavers

489 search results - page 50 / 98
» On the Execution of ODP Computational Specifications
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 8 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
EMSOFT
2006
Springer
14 years 13 days ago
Time-triggered implementations of dynamic controllers
Bridging the gap between model-based design and platformbased implementation is one of the critical challenges for embedded software systems. In the context of embedded control sy...
Truong Nghiem, George J. Pappas, Rajeev Alur, Anto...
ICCSA
2007
Springer
14 years 2 months ago
Crawling the Content Hidden Behind Web Forms
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is “hidden” behind the query forms of online data...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
SAC
2003
ACM
14 years 2 months ago
WebSOGO: A Global Ontology for Describing Web Sources
Based on the limitations raised by existing approaches in the context of the Semantic Web, we propose a formalism, Web Sources Global Ontology (WebSOGO), a data meta-model for the...
Edna Ruckhaus, Maria-Esther Vidal
POLICY
2001
Springer
14 years 1 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...