Sciweavers

733 search results - page 84 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
SIGSOFT
2007
ACM
16 years 17 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
WPES
2006
ACM
15 years 5 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
FAABS
2000
Springer
15 years 3 months ago
Modeling and Programming Devices and Web Agents
This paper integrates research in robot programming and reasoning about action with research in model-based reasoning about physical systems to provide a capability for modeling an...
Sheila A. McIlraith
FLOPS
2010
Springer
15 years 6 months ago
Automatically Generating Counterexamples to Naive Free Theorems
Disproof can be as important as proof in studying programs and programming languages. In particular, side conditions in a statement about program behavior are sometimes best unders...
Daniel Seidel, Janis Voigtländer
FM
2009
Springer
164views Formal Methods» more  FM 2009»
15 years 6 months ago
The Denotational Semantics of slotted-Circus
This paper describes a complete denotational semantics, in the UTP framework, of slotted-Circus, a generic framework for reasoning about discrete timed/synchronously clocked system...
Pawel Gancarski, Andrew Butterfield