Sciweavers

3909 search results - page 494 / 782
» Extreme Model Checking
Sort
View
136
Voted
OOPSLA
1992
Springer
15 years 9 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
C3S2E
2009
ACM
15 years 9 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
ECLIPSE
2007
ACM
15 years 9 months ago
MTSA: Eclipse support for modal transition systems construction, analysis and elaboration
In this paper we detail the design and implementation of an Eclipse plug-in that supports construction, analysis and elaboration of Modal Transition Systems. The plug-in supports ...
Nicolás D'Ippolito, Dario Fischbein, Howard...
116
Voted
CAV
2006
Springer
133views Hardware» more  CAV 2006»
15 years 8 months ago
Programs with Lists Are Counter Automata
Abstract. We address the verification problem of programs manipulating oneselector linked data structures. We propose a new automated approach for checking safety and termination f...
Ahmed Bouajjani, Marius Bozga, Peter Habermehl, Ra...
DATE
2004
IEEE
142views Hardware» more  DATE 2004»
15 years 8 months ago
Eliminating False Positives in Crosstalk Noise Analysis
Noise affects circuit operation by increasing gate delays and causing latches to capture incorrect values. Noise analysis techniques can detect some of such noise faults, but accu...
Yajun Ran, Alex Kondratyev, Yosinori Watanabe, Mal...