Sciweavers

624 search results - page 113 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
SIGCOMM
2012
ACM
12 years 12 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
JIPS
2010
195views more  JIPS 2010»
14 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
MEMOCODE
2007
IEEE
15 years 3 months ago
MEMOCODE 2007 Co-Design Contest
New to the 2007 MEMOCODE conference is the HW/SW Co-Design Contest. Members of the technical and steering committees from MEMOCODE 2006 thought that the co-design practice is dist...
Forrest Brewer, James C. Hoe
FIW
2007
14 years 11 months ago
Model Inference Approach for Detecting Feature Interactions in Integrated Systems
Many of the formal techniques are orchestrated for interaction detection in a complex integrated solution of hardware and software components. However, the applicability of these ...
Muzammil Shahbaz, Benoît Parreaux, Francis K...
BIRTHDAY
2003
Springer
15 years 2 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...