Sciweavers

793 search results - page 34 / 159
» Protocol Modeling with Model Program Composition
Sort
View
ENTCS
2007
107views more  ENTCS 2007»
13 years 7 months ago
Modeling Environment for Component Model Checking from Hierarchical Architecture
Application of model checking to isolated software components is not directly possible because a component does not form a complete program - the problem of missing environment oc...
Pavel Parizek, Frantisek Plasil
PERVASIVE
2009
Springer
14 years 2 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
SOCO
2007
Springer
14 years 1 months ago
Debugging Aspect-Enabled Programs
Abstract. The ability to debug programs composed using aspect-oriented programming (AOP) techniques is critical to the adoption of AOP. Nevertheless, many AOP systems lack adequate...
Marc Eaddy, Alfred V. Aho, Weiping Hu, Paddy McDon...
GPCE
2007
Springer
14 years 1 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...