Sciweavers

310 search results - page 30 / 62
» Sound and complete models of contracts
Sort
View
IEEEHPCS
2010
13 years 7 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
LOPSTR
2007
Springer
14 years 3 months ago
Snapshot Generation in a Constructive Object-Oriented Modeling Language
CooML is an object-oriented modeling language where specifications are theories in a constructive logic designed to handle incomplete information. In this logic we view snapshots ...
Mauro Ferrari, Camillo Fiorentini, Alberto Momigli...
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
14 years 3 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
IPSN
2005
Springer
14 years 2 months ago
Statistical model of lossy links in wireless sensor networks
Abstract— Recently, several wireless sensor network studies demonstrated large discrepancies between experimentally observed communication properties and properties produced by w...
Alberto Cerpa, Jennifer L. Wong, Louane Kuang, Mio...
ICCV
2011
IEEE
12 years 9 months ago
Perturb-and-MAP Random Fields: Using Discrete Optimization\\to Learn and Sample from Energy Models
We propose a novel way to induce a random field from an energy function on discrete labels. It amounts to locally injecting noise to the energy potentials, followed by finding t...
George Papandreou, Alan L. Yuille