Sciweavers

117 search results - page 21 / 24
» Towards preserving correctness in self-managed software syst...
Sort
View
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 1 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
DAGSTUHL
2003
13 years 8 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 2 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
ISPASS
2007
IEEE
14 years 1 months ago
A Comparison of Two Approaches to Parallel Simulation of Multiprocessors
— The design trend towards CMPs has made the simulation of multiprocessor systems a necessity and has also made multiprocessor systems widely available. While a serial multiproce...
Andrew Over, Bill Clarke, Peter E. Strazdins
POPL
2010
ACM
14 years 4 months ago
On the Verification Problem for Weak Memory Models
We address the verification problem of finite-state concurrent programs running under weak memory models. These models capture the reordering of program (read and write) operation...
Ahmed Bouajjani, Madanlal Musuvathi, Mohamed Faouz...