Sciweavers

502 search results - page 76 / 101
» Model Checking Timed Systems with Priorities
Sort
View
ENTCS
2007
99views more  ENTCS 2007»
15 years 3 months ago
Extending Symmetry Reduction Techniques to a Realistic Model of Computation
Much of the literature on symmetry reductions for model checking assumes a simple model of computation where the local state of each component in a concurrent system can be repres...
Alastair F. Donaldson, Alice Miller
AGTIVE
2007
Springer
15 years 9 months ago
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts
Abstract. Business process models describe workflows by a set of actions together with their ordering. When implementing business processes within a service-oriented architecture,...
Gregor Engels, Baris Güldali, Christian Solte...
BIRTHDAY
2010
Springer
15 years 8 months ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 3 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
139
Voted
ICPP
2002
IEEE
15 years 8 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...