Sciweavers

1054 search results - page 43 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
113
Voted
ASE
2008
102views more  ASE 2008»
15 years 2 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
15 years 11 days ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
DSN
2005
IEEE
15 years 7 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ISSTA
2004
ACM
15 years 7 months ago
Exploiting purity for atomicity
The notion that certain procedures are atomic is a fundamental correctness property of many multithreaded software systems. A procedure is atomic if for every execution there is a...
Cormac Flanagan, Stephen N. Freund, Shaz Qadeer
IJSN
2008
147views more  IJSN 2008»
15 years 1 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy