Sciweavers

1901 search results - page 150 / 381
» Predicting Program Properties from
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 1 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
BMCBI
2006
112views more  BMCBI 2006»
15 years 3 months ago
GENOMEMASKER package for designing unique genomic PCR primers
Background: The design of oligonucleotides and PCR primers for studying large genomes is complicated by the redundancy of sequences. The eukaryotic genomes are particularly diffic...
Reidar Andreson, Eric Reppo, Lauris Kaplinski, Mai...
RAID
2009
Springer
15 years 9 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
CCS
2006
ACM
15 years 6 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
SAC
2010
ACM
15 years 4 months ago
Reactive parallel processing for synchronous dataflow
The control flow of common processors does not match the specific needs of reactive systems. Key issues for these systems are preemption and concurrency, combined with timing pred...
Claus Traulsen, Reinhard von Hanxleden