Sciweavers

890 search results - page 132 / 178
» Programming language methods in computer security
Sort
View
AUSFORENSICS
2004
13 years 11 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
CP
2005
Springer
14 years 3 months ago
Automatic Detection of Variable and Value Symmetries
Abstract. Many symmetry breaking techniques assume that the symmetries of a CSP are given as input in addition to the CSP itself. We present a method that can be used to detect all...
Jean-Francois Puget
ATVA
2008
Springer
139views Hardware» more  ATVA 2008»
13 years 11 months ago
Compositional Verification for Component-Based Systems and Application
We present a compositional method for the verification of component-based systems described in a subset of the BIP language encompassing multi-party interaction without data transf...
Saddek Bensalem, Marius Bozga, Joseph Sifakis, Tha...
ICCS
2007
Springer
14 years 4 months ago
Multilingual Interfaces for Parallel Coupling in Multiphysics and Multiscale Systems
Abstract. Multiphysics and multiscale simulation systems are emerging as a new grand challenge in computational science, largely because of increased computing power provided by th...
Everest T. Ong, Jay Walter Larson, Boyana Norris, ...
EGC
2005
Springer
14 years 3 months ago
Implementation of Federated Databases Through Updatable Views
We present a new approach to the grid technology that is based on federated databases and updatable views. Views are used in two ways: (1) as wrappers of local servers that adopt l...
Hanna Kozankiewicz, Krzysztof Stencel, Kazimierz S...