Sciweavers

2513 search results - page 183 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
WORM
2003
15 years 6 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
CPHYSICS
2008
80views more  CPHYSICS 2008»
15 years 4 months ago
Fast clear-sky solar irradiation computation for very large digital elevation models
This paper presents a fast algorithm to compute the global clear-sky irradiation, appropriate for extended high-resolution Digital Elevation Models (DEMs). The latest equations pu...
Luis F. Romero, Siham Tabik, Jesús M. V&iac...
JSW
2008
130views more  JSW 2008»
15 years 4 months ago
A Constraint-Driven Executable Model of Dynamic System Reconfiguration
Dynamic system reconfiguration techniques are presented that can enable the systematic evolution of software systems due to unanticipated changes in specification or requirements. ...
D'Arcy Walsh, Francis Bordeleau, Bran Selic
DSN
2011
IEEE
14 years 4 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
CAV
2006
Springer
116views Hardware» more  CAV 2006»
15 years 8 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...