Sciweavers

19003 search results - page 202 / 3801
» We Need Assurance!
Sort
View
VMCAI
2004
Springer
14 years 4 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...
AOSD
2009
ACM
14 years 1 months ago
Modular verification of dynamically adaptive systems
Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
Ji Zhang, Heather Goldsby, Betty H. C. Cheng
INFSOF
2007
145views more  INFSOF 2007»
13 years 10 months ago
Metrics for data warehouse conceptual models understandability
Due to the principal role of Data warehouses (DW) in making strategy decisions, data warehouse quality is crucial for organizations. Therefore, we should use methods, models, tech...
Manuel A. Serrano, Juan Trujillo, Coral Calero, Ma...
JAR
2000
145views more  JAR 2000»
13 years 10 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 8 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...