Sciweavers

2488 search results - page 135 / 498
» An improvement in formal verification
Sort
View
115
Voted
RTCSA
2008
IEEE
15 years 7 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
84
Voted
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Design and Verification of Communication Protocols for Peer-to-Peer Multimedia Systems
This paper addresses issues pertaining to the necessity of utilizing formal verification methods in the design of protocols for peer-to-peer multimedia systems. These systems req...
Senem Velipasalar, Chang Hong Lin, Jason Schlessma...
CCS
1998
ACM
15 years 5 months ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg
C3S2E
2009
ACM
15 years 4 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 4 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith