Sciweavers

2043 search results - page 272 / 409
» Reasoning About Security Models
Sort
View
87
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
100
Voted
ESOP
2004
Springer
15 years 6 months ago
Canonical Graph Shapes
Abstract. Graphs are an intuitive model for states of a (software) system that include pointer structures — for instance, object-oriented programs. However, a naive encoding resu...
Arend Rensink
97
Voted
ECSA
2010
Springer
15 years 1 months ago
On representing variation
Although primarily studied in the context of product lines, variability is a key fact about most systems and therefore a concern for the architectures of those systems. Thus it is...
Rich Hilliard
SYNTHESE
2010
129views more  SYNTHESE 2010»
14 years 11 months ago
Belief and contextual acceptance
I develop a strategy for representing epistemic states and epistemic changes that seeks to be sensitive to the difference between voluntary and involuntary aspects of our epistemi...
Eleonora Cresto
VSTTE
2005
Springer
15 years 6 months ago
It Is Time to Mechanize Programming Language Metatheory
How close are we to a world in which mechanically verified software is commonplace? A world in which theorem proving technology is used routinely by both software developers and p...
Benjamin C. Pierce, Peter Sewell, Stephanie Weiric...