Sciweavers

111 search results - page 15 / 23
» Run-Time Verification of Networked Software
Sort
View
ICST
2010
IEEE
14 years 7 months ago
GraphSeq: A Graph Matching Tool for the Extraction of Mobility Patterns
Mobile computing systems provide new challenges for verification. One of them is the dynamicity of the system structure, with mobility-induced connections and disconnections, dynam...
Minh Duc Nguyen, Hélène Waeselynck, ...
NSDI
2004
14 years 11 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
DSN
2007
IEEE
15 years 4 months ago
Assurance Based Development of Critical Systems
  Assurance Based Development (ABD) is the synergistic construction of a critical computing system and an  assurance  case  that  sets  out  the  dependabilit...
Patrick J. Graydon, John C. Knight, Elisabeth A. S...
ITNG
2010
IEEE
15 years 2 months ago
BAUT: A Bayesian Driven Tutoring System
—This paper presents the design of BAUT, a tutoring system that explores statistical approach for providing instant project failure analysis. Driven by a Bayesian Network (BN) in...
Song Tan, Kai Qian, Xiang Fu, Prabir Bhattacharya
NDSS
2007
IEEE
15 years 3 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...