Sciweavers

3516 search results - page 573 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
OOPSLA
2004
Springer
15 years 9 months ago
C-SAW and genAWeave: a two-level aspect weaving toolsuite
This demonstration will feature overviews of the C-SAW and GenAWeave projects. The first half of the presentation will introduce the concept of two-level aspect weaving, which uni...
Jeffrey G. Gray, Jing Zhang, Suman Roychoudhury, I...
OOPSLA
2000
Springer
15 years 7 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
ENTCS
2007
104views more  ENTCS 2007»
15 years 3 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...
ACSAC
2010
IEEE
15 years 2 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
SENSYS
2010
ACM
15 years 1 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...