Sciweavers

2468 search results - page 234 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
ICSE
2010
IEEE-ACM
15 years 6 months ago
EMFStore: a model repository for EMF models
Models need to be put under version control to facilitate collaboration and to control change. EMFStore is a Software Configuration Management system tailored to the specific re...
Maximilian Koegel, Jonas Helming
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 9 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
ASE
2006
123views more  ASE 2006»
15 years 4 months ago
Separating sequence overlap for automated test sequence generation
Finite state machines have been used to model a number of classes of system and there has thus been much interest in the automatic generation of test sequences from finite state m...
Robert M. Hierons
EDOC
2008
IEEE
15 years 6 months ago
A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets
Model Driven Development (MDD) aims to promote the role of modeling in Software Engineering. Enterprise systems and architectures are often modeled via multiple representations. F...
Mohamed Ariff Ameedeen, Behzad Bordbar
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
15 years 2 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...