Sciweavers

2205 search results - page 317 / 441
» Mutation Operators for Specifications
Sort
View
120
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
100
Voted
BIOADIT
2006
Springer
15 years 7 months ago
MOVE Processors That Self-replicate and Differentiate
Abstract. This article describes an implementation of a basic multiprocessor system that exhibits replication and differentiation abilities on the POEtic tissue, a programmable har...
Joël Rossier, Yann Thoma, Pierre-André...
125
Voted
CCS
2006
ACM
15 years 7 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
160
Voted
ECRTS
2004
IEEE
15 years 7 months ago
TLSF: A New Dynamic Memory Allocator for Real-Time Systems
Dynamic storage allocation (DSA) algorithms play an important role in the modern software engineering paradigms and techniques (such as object oriented programming). Using DSA inc...
Miguel Masmano, Ismael Ripoll, Alfons Crespo, Jorg...
125
Voted
ECOWS
2006
Springer
15 years 7 months ago
A Value-Based Foundation for Service Modelling
A broader use of e-services for cross enterprise collaboration requires the services to be analysed and designed with a clear business focus. From a business perspective, the e-se...
Martin Henkel, Erik Perjons, Jelena Zdravkovic, Ch...