Sciweavers

357 search results - page 43 / 72
» Specifying and Verifying Fault-Tolerant Systems
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
POPL
2010
ACM
14 years 5 months ago
Structuring the verification of heap-manipulating programs
Most systems based on separation logic consider only restricted forms of implication or non-separating conjunction, as full support for these connectives requires a non-trivial no...
Aleksandar Nanevski, Josh Berdine, Viktor Vafeiadi...
WISE
2006
Springer
14 years 1 months ago
Pattern Based Property Specification and Verification for Service Composition
Service composition is becoming the dominant paradigm for developing Web service applications. It is important to ensure that a service composition complies with the requirements f...
Jian Yu, Tan Phan Manh, Jun Han, Yan Jin, Yanbo Ha...
BIRTHDAY
2005
Springer
14 years 1 months ago
Formal Software Development in MAYA
Abstract. The formal development of industrial-size software is an errorprone and therefore an evolutionary process. Verifying formal specifications usually reveals hidden errors ...
Dieter Hutter, Serge Autexier
CSMR
1998
IEEE
13 years 12 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont