Sciweavers

8828 search results - page 26 / 1766
» Formal methods in practice
Sort
View
DBSEC
1996
125views Database» more  DBSEC 1996»
14 years 11 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
ICDIM
2007
IEEE
15 years 4 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
CAISE
2005
Springer
15 years 3 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...
CHI
2007
ACM
15 years 10 months ago
Research through design as a method for interaction design research in HCI
For years the HCI community has struggled to integrate design in research and practice. While design has gained a strong foothold in practice, it has had much less impact on the H...
John Zimmerman, Jodi Forlizzi, Shelley Evenson
COMPSAC
1999
IEEE
15 years 2 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...