Sciweavers

276 search results - page 46 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
GI
2005
Springer
15 years 3 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...
SIGSOFT
2003
ACM
15 years 2 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee
JUCS
2010
130views more  JUCS 2010»
14 years 4 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 1 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...