Sciweavers

1027 search results - page 64 / 206
» Callgraph properties of executables
Sort
View
113
Voted
ICAC
2005
IEEE
15 years 6 months ago
The J3 Process for Building Autonomic Enterprise Java Bean Systems
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed enterprise applications. This paper provides two contributions to the...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
ISPASS
2005
IEEE
15 years 6 months ago
Performance Analysis of a New Packet Trace Compressor based on TCP Flow Clustering
In this paper we study the properties of a new packet trace compression method based on clustering of TCP flows. With our proposed method, the compression ratio that we achieve i...
Raimir Holanda, Javier Verdú, Jorge Garc&ia...
84
Voted
ICCSA
2005
Springer
15 years 6 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
AMAST
2000
Springer
15 years 5 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri
122
Voted
SPIN
1999
Springer
15 years 5 months ago
Assume-Guarantee Model Checking of Software: A Comparative Case Study
A variety of assume-guarantee model checking approaches have been proposed in the literature. In this paper, we describe several possible implementations of those approaches for ch...
Corina S. Pasareanu, Matthew B. Dwyer, Michael Hut...