Sciweavers

150 search results - page 27 / 30
» Checking Correctness of Transactional Behaviors
Sort
View
CAV
2010
Springer
179views Hardware» more  CAV 2010»
13 years 10 months ago
Generating Litmus Tests for Contrasting Memory Consistency Models
Well-defined memory consistency models are necessary for writing correct parallel software. Developing and understanding formal specifications of hardware memory models is a chal...
Sela Mador-Haim, Rajeev Alur, Milo M. K. Martin
SIGSAND
2008
13 years 7 months ago
Advanced Reduction Rules for the Verification of EPC Business Process Models
: Conceptual business process models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is...
Jan Mendling, Wil M. P. van der Aalst
SIGSOFT
2004
ACM
14 years 6 months ago
Efficient incremental algorithms for dynamic detection of likely invariants
Dynamic detection of likely invariants is a program analysis that generalizes over observed values to hypothesize program properties. The reported program properties are a set of ...
Jeff H. Perkins, Michael D. Ernst
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 8 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
DSN
2011
IEEE
12 years 5 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...