Sciweavers

1760 search results - page 251 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
EUROSYS
2008
ACM
15 years 11 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
IWIA
2005
IEEE
15 years 7 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ENTCS
2006
168views more  ENTCS 2006»
15 years 2 months ago
Case Study: Model Transformations for Time-triggered Languages
In this study, we introduce a model transformation tool for a time-triggered language: Giotto. The tool uses graphs to represent the source code (Giotto) and the target (the sched...
Tivadar Szemethy
WSC
2000
15 years 3 months ago
Simulation based design for a shipyard manufacturing process
Discrete event simulation can be used for virtual prototyping of new manufacturing facilities. Models built for this purpose must be easy to use, flexible, and provide a realistic...
Deborah J. Medeiros, Mark T. Traband, April Tribbl...
IWSM
2000
Springer
15 years 5 months ago
CEOS - A Cost Estimation Method for Evolutionary, Object-Oriented Software Development
: In this article we present a method for estimating the effort of software projects following an evolutionary, object-oriented development paradigm. Effort calculation is based on...
Siar Sarferaz, Wolfgang Hesse