Sciweavers

1111 search results - page 165 / 223
» Program Analysis as Model Checking of Abstract Interpretatio...
Sort
View
112
Voted
AINA
2007
IEEE
15 years 6 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
110
Voted
JUCS
2006
103views more  JUCS 2006»
15 years 2 months ago
An Object Model for Interoperable Systems
Abstract: Most modern computer applications should run on heterogeneous platforms and, moreover, objects and respective code should be easily interchangeable between distinct platf...
Alcides Calsavara, Aaron Borges, Leonardo Nunes, D...
ICECCS
2010
IEEE
196views Hardware» more  ICECCS 2010»
15 years 2 months ago
Implementing and Evaluating a Model Checker for Transactional Memory Systems
Abstract—Transactional Memory (TM) is a promising technique that addresses the difficulty of parallel programming. Since TM takes responsibility for all concurrency control, TM ...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
105
Voted
PPDP
2007
Springer
15 years 8 months ago
Real-time rewriting semantics of orc
Orc is a language proposed by Jayadev Misra [19] for orchestration of distributed services. Orc is very simple and elegant, based on a few basic constructs, and allows succinct an...
Musab AlTurki, José Meseguer
129
Voted
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...