Sciweavers

96 search results - page 10 / 20
» Algorithmic Verification of Single-Pass List Processing Prog...
Sort
View
SIGSOFT
2002
ACM
15 years 10 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
77
Voted
FLOPS
2006
Springer
15 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
88
Voted
POPL
2010
ACM
15 years 7 months ago
Continuity Analysis of Programs
We present an analysis to automatically determine if a program represents a continuous function, or equivalently, if infinitesimal changes to its inputs can only cause infinitesim...
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerm...
BMCBI
2005
85views more  BMCBI 2005»
14 years 9 months ago
Processing methods for differential analysis of LC/MS profile data
Background: Liquid chromatography coupled to mass spectrometry (LC/MS) has been widely used in proteomics and metabolomics research. In this context, the technology has been incre...
Mikko Katajamaa, Matej Oresic
SIGSOFT
2003
ACM
15 years 10 months ago
Bogor: an extensible and highly-modular software model checking framework
Model checking is emerging as a popular technology for reasoning about behavioral properties of a wide variety of software artifacts including: requirements models, architectural ...
Robby, Matthew B. Dwyer, John Hatcliff