Sciweavers

2513 search results - page 339 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
74
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Incremental state-space exploration for programs with dynamically allocated data
We present a novel technique that speeds up state-space exploration (SSE) for evolving programs with dynamically allocated data. SSE is the essence of explicit-state model checkin...
Steven Lauterburg, Ahmed Sobeih, Darko Marinov, Ma...
ICSE
2008
IEEE-ACM
16 years 1 months ago
Tool support for data validation by end-user programmers
End-user programming tools for creating spreadsheets and webforms offer no data types except "string" for storing many kinds of data, such as person names and street add...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
111
Voted
CSMR
2007
IEEE
15 years 7 months ago
Consistently Incorporating Changes to Evolve Transition-based Systems
Evolving software-intensive systems from one consistent state to another is a challenging activity due to the intricate inter-dependencies among the components. In this paper, we ...
Mahadevan Subramaniam, Harvey P. Siy
POPL
2003
ACM
16 years 29 days ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani
EMSOFT
2004
Springer
15 years 6 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter