Sciweavers

2513 search results - page 9 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
NSDI
2004
13 years 11 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
EMSOFT
2010
Springer
13 years 7 months ago
Semantics-preserving implementation of synchronous specifications over dynamic TDMA distributed architectures
We propose a technique to automatically synthesize programs and schedules for hard real-time distributed (embedded) systems from synchronous data-flow models. Our technique connec...
Dumitru Potop-Butucaru, Akramul Azim, Sebastian Fi...
SPLC
2007
13 years 11 months ago
Mapping Feature Models onto Component Models to Build Dynamic Software Product Lines
Systems such as adaptative and context–aware ones must adapt themselves to changing requirements at runtime. Modeling and implementing this kind of systems is a difficult opera...
Pablo Trinidad, Antonio Ruiz Cortés, Joaqu&...
ESE
2002
114views Database» more  ESE 2002»
13 years 9 months ago
An Industrial Case Study to Examine a Non-Traditional Inspection Implementation for Requirements Specifications
Software inspection is one of the key enablers for quality improvement and defect cost reduction. Although its benefits are shown in many studies, a major obstacle to implement an...
Oliver Laitenberger, Thomas Beil, Thilo Schwinn