Sciweavers

3436 search results - page 412 / 688
» Software Tools for Performance Modeling of Parallel Programs
Sort
View
109
Voted
SIGSOFT
2000
ACM
15 years 6 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
WCET
2010
15 years 10 days ago
METAMOC: Modular Execution Time Analysis using Model Checking
Safe and tight worst-case execution times (WCETs) are important when scheduling hard realtime systems. This paper presents METAMOC, a modular method, based on model checking and s...
Andreas E. Dalsgaard, Mads Chr. Olesen, Martin Tof...
101
Voted
ICFEM
2009
Springer
15 years 9 months ago
A Lazy Unbounded Model Checker for Event-B
Formal specification languages are traditionally supported by theorem provers, but recently model checkers have proven to be useful tools. In this paper we present Eboc, an explic...
Paulo J. Matos, Bernd Fischer, João P. Marq...
108
Voted
NDSS
2007
IEEE
15 years 8 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 8 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard