Sciweavers

2500 search results - page 109 / 500
» Specifying Behavior in C
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...
FASE
2005
Springer
15 years 3 months ago
Non-local Choice and Beyond: Intricacies of MSC Choice Nodes
MSC is a visual formalism for specifying the behavior of systems. To obtain implementations for individual processes, the MSC choice construction poses fundamental problems. The be...
Arjan J. Mooij, Nicolae Goga, Judi Romijn
FM
2005
Springer
99views Formal Methods» more  FM 2005»
15 years 3 months ago
Semantics of BPEL4WS-Like Fault and Compensation Handling
BPEL4WS is one of the most important business process modelling languages. One distinct feature of it is the fully programmable fault and compensation handling mechanism, which all...
Zongyan Qiu, Shuling Wang, Geguang Pu, Xiangpeng Z...
IPPS
2003
IEEE
15 years 3 months ago
An Object Oriented Framework for an Associative Model of Parallel Computation
An object oriented description and framework of the Multiple ASsociative Computing (MASC) model of parallel computation is presented. This description identifies MASC objects and ...
Michael Scherger, Jerry L. Potter, Johnnie W. Bake...
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 2 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt