Sciweavers

620 search results - page 93 / 124
» Abstract Analysis of Symbolic Executions
Sort
View
115
Voted
CSFW
2007
IEEE
15 years 7 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
191
Voted
CSMR
2011
IEEE
14 years 4 months ago
Software Maintenance Research in the PROGRESS Project for Predictable Embedded Software Systems
Abstract—PROGRESS is a project and strategic research centre at M¨alardalen University in Sweden that is funded for 2006– 2010 by the Swedish Foundation for Strategic Research...
Johan Kraft, Holger M. Kienle, Thomas Nolte, Ivica...
TAOSD
2010
14 years 11 months ago
Aspect-Oriented Development Using Protocol Modeling
Abstract. The aim of this paper is to explore the modeling of crosscutavioral abstractions. We argue that behavioral aspects can be a particular kind of more general behavioral abs...
Ashley T. McNeile, Ella E. Roubtsova
79
Voted
ICSE
2007
IEEE-ACM
16 years 21 days ago
Is Code Still Moving Around? Looking Back at a Decade of Code Mobility
In the mid-nineties, mobile code was on the rise and, in particular, there was a growing interest in autonomously moving code components, called mobile agents. In 1997, we publish...
Antonio Carzaniga, Gian Pietro Picco, Giovanni Vig...
108
Voted
SAMOS
2009
Springer
15 years 7 months ago
An Embrace-and-Extend Approach to Managing the Complexity of Future Heterogeneous Systems
Abstract. In this paper, we present a particularly lightweight, integrative approach to programming and executing applications targeting heterogeneous, dynamically reconfigurable ...
Rainer Buchty, Mario Kicherer, David Kramer, Wolfg...