Sciweavers

1432 search results - page 50 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
WCRE
2000
IEEE
15 years 7 months ago
Next Generation Data Interchange: Tool-to-Tool Application Program Interfaces
Data interchange in the form of a standard exchange format(SEF) is only a first step towards tool interoperability. Inter-tool communication using files is slow and cumbersome; a ...
Susan Elliott Sim
SECURWARE
2008
IEEE
15 years 9 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
ISSTA
2009
ACM
15 years 9 months ago
Loop-extended symbolic execution on binary programs
Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including securityrelevant ones. However, existing symbolic execution...
Prateek Saxena, Pongsin Poosankam, Stephen McCaman...
SIGSOFT
2006
ACM
16 years 4 months ago
Dynamic slicing long running programs through execution fast forwarding
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was believed to be prohibitively expensive. In this paper, we present a novel execu...
Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta
91
Voted
KBSE
2008
IEEE
15 years 9 months ago
Unifying Analysis Tools with Rosetta
The Rosetta system specification language will require a variety of analysis capabilities to assist system designers. The language’s generality prohibits the development of a s...
Nicolas Frisby