Sciweavers

837 search results - page 127 / 168
» Proof Development with OMEGA
Sort
View
KBSE
2005
IEEE
14 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
RTAS
2005
IEEE
14 years 3 months ago
On Schedulability Bounds of Static Priority Schedulers
—Real-time systems need to use the schedulability test to determine whether or not admitted tasks can meet their deadlines. The utilization based schedulability test is the most ...
Jianjia Wu, Jyh-Charn Liu, Wei Zhao
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
14 years 3 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...
SAFECOMP
2005
Springer
14 years 3 months ago
Safety Interfaces for Component-Based Systems
Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea
SEMWEB
2005
Springer
14 years 3 months ago
An Ontological Framework for Dynamic Coordination
Abstract. Coordination is the process of managing the possible interactions between activities and processes; a mechanism to handle such interactions is known as a coordination reg...
Valentina A. M. Tamma, Chris van Aart, Thierry Moy...