Sciweavers

1199 search results - page 102 / 240
» Software Verification and Software Engineering a Practitione...
Sort
View
ATAL
2008
Springer
15 years 6 months ago
A flexible framework for verifying agent programs
There is an increasing number of agent-oriented programming languages that have working interpreters and platforms, with significant progress in the quality of such platforms over...
Louise A. Dennis, Berndt Farwer, Rafael H. Bordini...
131
Voted
SIGSOFT
2005
ACM
16 years 5 months ago
Relational analysis of algebraic datatypes
We present a technique that enables the use of finite model finding to check the satisfiability of certain formulas whose intended models are infinite. Such formulas arise when us...
Viktor Kuncak, Daniel Jackson
IWPC
2005
IEEE
15 years 10 months ago
Working Session on Interoperable Reengineering Services
Interoperability is the challenge involved in getting software components to work together. This working session discusses in depth the state of the art in reengineering tool inte...
Dean Jin, Andreas Winter
AC
1997
Springer
15 years 8 months ago
Recent Developments in the Design of Conventional Cryptographic Algorithms
Abstract. This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a...
Bart Preneel, Vincent Rijmen, Antoon Bosselaers
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...