Sciweavers

1031 search results - page 151 / 207
» On the Formal Development of Safety-Critical Software
Sort
View
FASE
2004
Springer
15 years 6 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
87
Voted
ISQED
2003
IEEE
96views Hardware» more  ISQED 2003»
15 years 6 months ago
Impact of Interoperability on CAD-IP Reuse: An Academic Viewpoint
Mind-boggling complexity of EDA tools necessitates reuse of intellectual property in any large-scale commercial or academic operation. However, due to the nature of software, a to...
Andrew B. Kahng, Igor L. Markov
119
Voted
EUROMICRO
2009
IEEE
15 years 4 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas
108
Voted
APSEC
2004
IEEE
15 years 4 months ago
Reasoning about Semantic Web in Isabelle/HOL
Semantic Web is regarded as the next generation of the World Wide Web. It provides not only the structure of the web but also meaningful semantics for the information presented. T...
Yue Tang, Jin Song Dong, Jing Sun, Brendan P. Maho...
83
Voted
ICSE
2000
IEEE-ACM
15 years 4 months ago
Verification of time partitioning in the DEOS scheduler kernel
This paper describes an experiment to use the Spin model checking system to support automated verification of time partitioning in the Honeywell DEOS real-time scheduling kernel. ...
John Penix, Willem Visser, Eric Engstrom, Aaron La...