Sciweavers

1448 search results - page 212 / 290
» Restricted Stack Implementations
Sort
View
SAFECOMP
2007
Springer
14 years 1 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
W2GIS
2007
Springer
14 years 1 months ago
XFormsGI - Extending XForms for Geospatial and Sensor Data
User interaction is mostly based on forms. However, forms are restricted to alphanumerical data – the editing of geospatial data is not supported. This statement does not only ho...
Jürgen Weitkämper, Thomas Brinkhoff
DEXAW
2006
IEEE
153views Database» more  DEXAW 2006»
14 years 1 months ago
Capturing and Using the Operational Semantics of Large Distributed Systems: Sharing Common Application Requirements in Virtual O
Organisations may wish to use a standards-defined distributed system in a global sense but also have a requirement for non-standard local behaviour. This reflects the production...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
DSD
2006
IEEE
110views Hardware» more  DSD 2006»
14 years 1 months ago
A Flexible, Syntax Independent Representation (SIR) for System Level Design Models
System Level Design (SLD) is widely seen as a solution for bridging the gap between chip complexity and design productivity of Systems on Chip (SoC). SLD relieves the designer fro...
Ines Viskic, Rainer Dömer
DSN
2006
IEEE
14 years 1 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha