Sciweavers

2513 search results - page 182 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
SCCC
1999
IEEE
15 years 9 months ago
Safe-Threads: A New Model for Object-Oriented Multi-Threaded Languages
Threads have been present in programming languages for some time now. However, they have a bad image among software developers because they lead to unreliable applications. Most o...
Luis Mateu, José M. Piquer
ICDCS
1996
IEEE
15 years 9 months ago
The Relative Importance of Concurrent Writers and Weak Consistency Models
This paper presents a detailed comparison of the relative importance of allowing concurrent writers versus the choice of the underlying consistency model. Our comparison is based ...
Peter J. Keleher
FMICS
2006
Springer
15 years 8 months ago
Model-Based Testing of a WAP Gateway: An Industrial Case-Study
Abstract. We present experiences from a case study where a model-based approach to black-box testing is applied to verify that a Wireless Application Protocol (WAP) gateway conform...
Anders Hessel, Paul Pettersson
INFOSCALE
2007
ACM
15 years 6 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
CASCON
2006
107views Education» more  CASCON 2006»
15 years 6 months ago
Tailoring UML activities to use case modeling for web application development
UML activity models (activities, for short) have become widely accepted for specifying the dynamic behavior of use cases. For an adequate specification of use cases in the context...
Alexander Lorenz, Hans-Werner Six