Sciweavers

ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 2 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ICECCS
2005
IEEE
171views Hardware» more  ICECCS 2005»
14 years 2 months ago
Behavior Capture and Test: Automated Analysis of Component Integration
Component-based technology is increasingly adopted to speed up the development of complex software through component reuse. Unfortunately, the lack of complete information about r...
Leonardo Mariani, Mauro Pezzè
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 2 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 2 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
ICECCS
2005
IEEE
65views Hardware» more  ICECCS 2005»
14 years 2 months ago
Principles, Standards and Tools for Model Engineering
We take here a broad view of model engineering as encompassing different approaches such as the OMG MDA™ proposal [9], the Microsoft Software Factories view [5], and many others...
Jean Bézivin, Frédéric Jouaul...
ICECCS
2005
IEEE
73views Hardware» more  ICECCS 2005»
14 years 2 months ago
Integrating Object-Z with Timed Automata
When designing a complex system, Object-Z is a powerful logic-based language for modeling the system state aspects, and Timed Automata is an excellent graph-based notation for cap...
Jin Song Dong, Roger Duke, Ping Hao
ICECCS
2005
IEEE
89views Hardware» more  ICECCS 2005»
14 years 2 months ago
A Tool-Supported Approach to Testing UML Design Models
For Model Driven Development approaches to succeed, there is a need for model validation techniques. This paper presents an approach to testing designs described by UML class diag...
Trung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh,...
ICECCS
2005
IEEE
83views Hardware» more  ICECCS 2005»
14 years 2 months ago
An Introduction to Self-Healing Web Services
Luciano Baresi, Sam Guinea
ICCD
2005
IEEE
101views Hardware» more  ICCD 2005»
14 years 2 months ago
The TM3270 Media-Processor Data Cache
Jan-Willem van de Waerdt, Stamatis Vassiliadis, Je...
ICCD
2005
IEEE
159views Hardware» more  ICCD 2005»
14 years 2 months ago
Architectural-Level Fault Tolerant Computation in Nanoelectronic Processors
Nanoelectronic devices are expected to have extremely high and variable fault rates; thus future processor architectures based on these unreliable devices need to be built with fa...
Wenjing Rao, Alex Orailoglu, Ramesh Karri