Sciweavers

1528 search results - page 232 / 306
» Performance Assertion Checking
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ADC
2004
Springer
109views Database» more  ADC 2004»
14 years 2 months ago
Data Flow and Validation in Workflow Modelling
A complete workflow specification requires careful integration of many different process characteristics. Decisions must be made as to the definitions of individual activities, th...
Shazia W. Sadiq, Maria E. Orlowska, Wasim Sadiq, C...
CCS
2004
ACM
14 years 2 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
EMSOFT
2004
Springer
14 years 2 months ago
A typed assembly language for real-time programs
We present a type system for E code, which is an assembly language that manages the release, interaction, and termination of real-time tasks. E code specifies a deadline for each...
Thomas A. Henzinger, Christoph M. Kirsch
FASE
2004
Springer
14 years 2 months ago
Systematic Testing of Software Architectures in the C2 Style
The topic of software architecture (SA) based testing has recently raised some interest. Recent work on the topic has used the SA as a reference model for code conformance testing,...
Henry Muccini, Marcio S. Dias, Debra J. Richardson