Sciweavers

237 search results - page 21 / 48
» Automating Refinement Checking in Probabilistic System Desig...
Sort
View
KBSE
2007
IEEE
15 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
OOPSLA
2007
Springer
15 years 11 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
CL
2006
Springer
15 years 4 months ago
Co-evolving code and design with intensional views: A case study
Intensional views and relations have been proposed as a way of actively documenting high-level structural regularities in the source code of a software system. By checking conform...
Kim Mens, Andy Kellens, Frédéric Plu...
146
Voted
LPAR
2010
Springer
15 years 3 months ago
The Consistency of the CADIAG-2 Knowledge Base: A Probabilistic Approach
Abstract. The paper presents the methodology and the results of checking consistency of the knowledge base of CADIAG-2, a large-scale medical expert system. Such knowledge base con...
Pavel Klinov, Bijan Parsia, David Picado-Mui&ntild...
DAC
2006
ACM
16 years 5 months ago
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee confidentiality and integrity of data exchanged b...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...