Sciweavers

20 search results - page 3 / 4
» Incremental Integrity Checking: Limitations and Possibilitie...
Sort
View
REFSQ
2009
Springer
14 years 17 days ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
TON
2008
75views more  TON 2008»
13 years 5 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
SAC
2003
ACM
13 years 11 months ago
Eliciting Coordination Policies from Requirements
Software coordination models and languages describe how agents, resources and processes work together to implement a software system. One of their limitations is that they are use...
Henry Muccini, Fabio Mancinelli
PPSWR
2004
Springer
13 years 11 months ago
Towards a Multi-calendar Temporal Type System for (Semantic) Web Query Languages
Abstract. Time is omnipresent on the (Semantic) Web. However, formalism like XML, XML Schema, RDF, OWL and (Semantic) Web query languages have, if any, only very limited notions of...
François Bry, Stephanie Spranger
PLDI
2009
ACM
14 years 25 days ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...