Sciweavers

1809 search results - page 193 / 362
» Software Model Checking Using Linear Constraints
Sort
View
AIPS
2010
13 years 10 months ago
Incrementally Solving STNs by Enforcing Partial Path Consistency
Efficient management and propagation of temporal constraints is important for temporal planning as well as for scheduling. During plan development, new events and temporal constra...
Léon Planken, Mathijs de Weerdt, Neil Yorke...
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Precise Service Level Agreements
SLAng is an XML language for defining service level agreements, the part of a contract between the client and provider of an Internet service that describes the quality attributes...
James Skene, D. Davide Lamanna, Wolfgang Emmerich
CCS
2004
ACM
14 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ICSE
2008
IEEE-ACM
14 years 10 months ago
Testing pervasive software in the presence of context inconsistency resolution services
Pervasive computing software adapts its behavior according to the changing contexts. Nevertheless, contexts are often noisy. Context inconsistency resolution provides a cleaner pe...
Heng Lu, W. K. Chan, T. H. Tse