Sciweavers

169 search results - page 3 / 34
» From Operating-System Correctness to Pervasively Verified Ap...
Sort
View
SIGMETRICS
2006
ACM
106views Hardware» more  SIGMETRICS 2006»
13 years 11 months ago
Automatic logging of operating system effects to guide application-level architecture simulation
Modern architecture research relies heavily on applicationlevel detailed pipeline simulation. A time consuming part of building a simulator is correctly emulating the operating sy...
Satish Narayanasamy, Cristiano Pereira, Harish Pat...
JSS
2007
105views more  JSS 2007»
13 years 5 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...
USENIX
2007
13 years 8 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
HOTOS
2009
IEEE
13 years 9 months ago
Augmented Smartphone Applications Through Clone Cloud Execution
Smartphones enable a new, rich user experience in pervasive computing, but their hardware is still very limited in terms of computation, memory, and energy reserves, thus limiting...
Byung-Gon Chun, Petros Maniatis
FMICS
2010
Springer
13 years 6 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó