Sciweavers

3792 search results - page 145 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICSE
2010
IEEE-ACM
15 years 6 months ago
Impact analysis for event-based components and systems
In my dissertation, I aim to develop a dependence-based impact analysis technique for event-based systems and eventbased components that communicate via messages. This paper motiv...
Daniel Popescu
127
Voted
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 10 months ago
Minimal TCB Code Execution
TCB Code Execution (Extended Abstract)∗ Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri Carnegie Mellon University We propose an architect...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
101
Voted
KBSE
2008
IEEE
15 years 10 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
163
Voted
SOCO
2007
Springer
15 years 10 months ago
Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures
In component based software engineering, an application is build by composing trusted and reusable units of execution, the components. A composition is formed by connecting the com...
Dietmar Schreiner, Karl M. Göschka
98
Voted
VMCAI
2005
Springer
15 years 9 months ago
Termination of Polynomial Programs
We present a technique to prove termination of multipath polynomial programs, an expressive class of loops that enables practical traction and analysis. The technique is based on ...
Aaron R. Bradley, Zohar Manna, Henny B. Sipma