Sciweavers

2673 search results - page 462 / 535
» Guided Static Analysis
Sort
View
FOAL
2007
ACM
15 years 8 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
160
Voted
FORMATS
2007
Springer
15 years 8 months ago
Partial Order Reduction for Verification of Real-Time Components
Abstract. We describe a partial order reduction technique for a realtime component model. Components are described as timed automata with data ports, which can be composed in stati...
John Håkansson, Paul Pettersson
DAWAK
2009
Springer
15 years 8 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...
ACSAC
2004
IEEE
15 years 7 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
ASAP
2006
IEEE
168views Hardware» more  ASAP 2006»
15 years 7 months ago
Dual-Processor Design of Energy Efficient Fault-Tolerant System
A popular approach to guarantee fault tolerance in safety-critical applications is to run the application on two processors. A checkpoint is inserted at the completion of the prim...
Shaoxiong Hua, Pushkin R. Pari, Gang Qu