Sciweavers

3555 search results - page 637 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SPATIALCOGNITION
1998
Springer
15 years 5 months ago
Shape Nouns and Shape Concepts: A Geometry for 'Corner'
This paper investigates geometric and ontological aspects of shape concepts underlying the semantics of nouns. Considering the German shape nouns Ecke and Knick (corner and kink) w...
Carola Eschenbach, Christopher Habel, Lars Kulik, ...
POPL
1994
ACM
15 years 5 months ago
Dominators, Super Blocks, and Program Coverage
In this paper we present techniques to nd subsets of nodes of a owgraph that satisfy the followingproperty: A test set that exercises all nodes in a subset exercises allnodes in t...
Hiralal Agrawal
AAAI
2007
15 years 3 months ago
A Multi-Dimensional Trust Model for Heterogeneous Contract Observations
In this paper we develop a novel probabilistic model of computational trust that allows agents to exchange and combine reputation reports over heterogeneous, correlated multi-dime...
Steven Reece, Stephen Roberts, Alex Rogers, Nichol...
DSN
2008
IEEE
15 years 3 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
WSC
2004
15 years 2 months ago
A Data Warehouse Environment for Storing and Analyzing Simulation Output Data
Discrete event simulation modelling has been extensively used in modelling complex systems. Although it offers great conceptual-modelling flexibility, it is both computationally e...
Christos Vasilakis, Elia El-Darzi, Panagiotis Chou...