This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Recently a lot of multimedia applications are emerging on portable appliances. They require both the flexibility of upgradeable devices (traditionally software based) and a powerf...
Michele Borgatti, Andrea Capello, Umberto Rossi, J...
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspeciļ¬ed event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
This paper proposes a simulation-based methodology for validation of a system under design in an early phase of development. The key element of this approach is the visual speciļ¬...
Much of the work reported in the ļ¬rst three DSVIS conferences has concentrated on techniques and languages for specifying and developing interactive systems. In this paper, we ar...
Robert E. Fields, Nicholas A. Merriam, Andrew M. D...