Sciweavers

28 search results - page 1 / 6
» Execution monitoring enforcement under memory-limitation con...
Sort
View
IANDC
2008
74views more  IANDC 2008»
13 years 4 months ago
Execution monitoring enforcement under memory-limitation constraints
Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is ...
Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi
VLDB
2004
ACM
134views Database» more  VLDB 2004»
13 years 9 months ago
Memory-Limited Execution of Windowed Stream Joins
We address the problem of computing approximate answers to continuous sliding-window joins over data streams when the available memory may be insufficient to keep the entire join...
Utkarsh Srivastava, Jennifer Widom
DATE
2003
IEEE
112views Hardware» more  DATE 2003»
13 years 9 months ago
Automatic Generation of Simulation Monitors from Quantitative Constraint Formula
System design methodology is poised to become the next big enabler for highly sophisticated electronic products. Design verification continues to be a major challenge and simulat...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 2 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
TDSC
2011
12 years 11 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode