Sciweavers

111 search results - page 16 / 23
» Run-Time Verification of Networked Software
Sort
View
IIWAS
2008
14 years 11 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
SIGSOFT
2007
ACM
15 years 10 months ago
Program representations for testing wireless sensor network applications
Because of the growing complexity of wireless sensor network applications (WSNs), traditional software development tools are being developed that are specifically designed for the...
Nguyet T. M. Nguyen, Mary Lou Soffa
83
Voted
ICSE
2010
IEEE-ACM
15 years 2 months ago
A methodology to support load test analysis
Performance analysts rely heavily on load testing to measure the performance of their applications under a given load. During the load test, analyst strictly monitor and record th...
Haroon Malik
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
SIGSOFT
2008
ACM
15 years 10 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang