Sciweavers

1098 search results - page 162 / 220
» System safety as an emergent property in composite systems
Sort
View
SIGMETRICS
2008
ACM
13 years 8 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
TOPLAS
2002
98views more  TOPLAS 2002»
13 years 8 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
14 years 21 days ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
ECMDAFA
2006
Springer
166views Hardware» more  ECMDAFA 2006»
14 years 15 days ago
Dynamic Logic Semantics for UML Consistency
Abstract. The Unified Modelling Language (UML) is intended to describe systems, but it is not clear what systems satisfy a given collection of UML diagrams. Stephen Mellor has desc...
Greg O'Keefe
WWW
2008
ACM
14 years 9 months ago
Planetary-scale views on a large instant-messaging network
We present a study of anonymized data capturing a month of high-level communication activities within the whole of the Microsoft Messenger instant-messaging system. We examine cha...
Jure Leskovec, Eric Horvitz