Sciweavers

Share
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
9 years 11 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
AMAST
2004
Springer
10 years 9 days ago
Formal JVM Code Analysis in JavaFAN
JavaFAN uses a Maude rewriting logic specification of the JVM semantics as the basis of a software analysis tool with competitive performance. It supports formal analysis of concu...
Azadeh Farzan, José Meseguer, Grigore Rosu
ISSTA
2006
ACM
10 years 26 days ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
SEFM
2006
IEEE
10 years 27 days ago
Automatic Property Checking for Software: Past, Present and Future
tic analysis tools based on abstraction are sound but not complete. Several practical static analysis tools are heuristic in nature —they are neither sound nor complete, but have...
Sriram K. Rajamani
FDL
2006
IEEE
10 years 29 days ago
Design Structure Analysis and Transaction Recording in SystemC
We present an introspection/reflection framework for SystemC which extracts design-relevant structure information and transaction data under any LRM-2.1 compliant simulation kern...
Wolfgang Klingauf, Manuel Geffken
TOOLS
2008
IEEE
10 years 1 months ago
A Comparison of State-Based Modelling Tools for Model Validation
In model-based testing, one of the biggest decisions taken before modelling is the modelling language and the model analysis tool to be used to model the system under investigation...
Emine G. Aydal, Mark Utting, Jim Woodcock
KBSE
2008
IEEE
10 years 1 months ago
Unifying Analysis Tools with Rosetta
The Rosetta system specification language will require a variety of analysis capabilities to assist system designers. The language’s generality prohibits the development of a s...
Nicolas Frisby
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
10 years 1 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
books