Sciweavers

96 search results - page 10 / 20
» Algorithmic Verification of Single-Pass List Processing Prog...
Sort
View
SIGSOFT
2002
ACM
16 years 11 days ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
FLOPS
2006
Springer
15 years 3 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
POPL
2010
ACM
15 years 9 months ago
Continuity Analysis of Programs
We present an analysis to automatically determine if a program represents a continuous function, or equivalently, if infinitesimal changes to its inputs can only cause infinitesim...
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerm...
BMCBI
2005
85views more  BMCBI 2005»
14 years 11 months ago
Processing methods for differential analysis of LC/MS profile data
Background: Liquid chromatography coupled to mass spectrometry (LC/MS) has been widely used in proteomics and metabolomics research. In this context, the technology has been incre...
Mikko Katajamaa, Matej Oresic
SIGSOFT
2003
ACM
16 years 11 days ago
Bogor: an extensible and highly-modular software model checking framework
Model checking is emerging as a popular technology for reasoning about behavioral properties of a wide variety of software artifacts including: requirements models, architectural ...
Robby, Matthew B. Dwyer, John Hatcliff