Sciweavers

1054 search results - page 50 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
EMSOFT
2007
Springer
15 years 5 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
SACMAT
2009
ACM
15 years 8 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
SIGSOFT
2006
ACM
15 years 8 months ago
Bit level types for high level reasoning
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
Ranjit Jhala, Rupak Majumdar
HYBRID
2007
Springer
15 years 8 months ago
Systematic Simulation Using Sensitivity Analysis
In this paper we propose a new technique for verification by simulation of continuous and hybrid dynamical systems with uncertain initial conditions. We provide an algorithmic met...
Alexandre Donzé, Oded Maler
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 8 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan