Sciweavers

2488 search results - page 285 / 498
» An improvement in formal verification
Sort
View
SP
2000
IEEE
15 years 6 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
WETICE
1999
IEEE
15 years 5 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
VL
1997
IEEE
151views Visual Languages» more  VL 1997»
15 years 5 months ago
A Structured Interactive Workspace for a Visual Configuration Language
This paper shows how language technologies such as the automatic generation of parsers for analyzing user actions and visual parsing can be applied to build a flexible tool specia...
Jean-Yves Vion-Dury, François Pacull
106
Voted
WSC
2008
15 years 3 months ago
How to build better models: Applying agile techniques to simulation
For simulation practitioners, the common steps in a simulation modeling engagement are likely familiar: problem assessment, requirements specification, model building, verificatio...
James T. Sawyer, David M. Brann
APLAS
2008
ACM
15 years 3 months ago
Certified Reasoning in Memory Hierarchies
Abstract. Parallel programming is rapidly gaining importance as a vector to develop high performance applications that exploit the improved capabilities of modern computer architec...
Gilles Barthe, César Kunz, Jorge Luis Sacch...