Sciweavers

1541 search results - page 10 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
CAISE
2001
Springer
14 years 1 months ago
Techniques for Reactive System Design: The Tools in TRADE
Reactive systems are systems whose purpose is to maintain a certain desirable state of affairs in their environment, and include information systems, groupware, workflow systems,...
Roel Wieringa, David N. Jansen
JUCS
2010
215views more  JUCS 2010»
13 years 3 months ago
A Multidisciplinary Survey of Computational Techniques for the Modelling, Simulation and Analysis of Biochemical Networks
: All processes of life are controlled by networks of interacting biochemical components. The purpose of modelling these networks is manifold. From a theoretical point of view it a...
James Decraene, Thomas Hinze
OOPSLA
2007
Springer
14 years 2 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
12 years 4 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili
DSN
2004
IEEE
14 years 9 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...