Sciweavers

1818 search results - page 225 / 364
» How users use access control
Sort
View
138
Voted
SPIN
2000
Springer
15 years 8 months ago
Logic Verification of ANSI-C Code with SPIN
We describe a tool, called AX, that can be used in combination with the model checker SPIN to efficiently verify logical properties of distributed software systems implemented in A...
Gerard J. Holzmann
PERCOM
2010
ACM
15 years 2 months ago
Target tracking with packet delays and losses - QoI amid latencies and missing data
—In this paper, we investigate how packet delays and losses affect the quality of target tracking. Specifically, we use Bayesian information of the posterior distribution of tar...
Wei Wei, Ting He, Chatschik Bisdikian, Dennis Goec...
GPC
2009
Springer
15 years 2 months ago
Application Level Interoperability between Clouds and Grids
SAGA is a high-level programming interface which provides the ability to develop distributed applications in an infrastructure independent way. In an earlier paper, we discussed ho...
André Merzky, Katerina Stamou, Shantenu Jha
CSFW
2011
IEEE
14 years 4 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 9 months ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...