Sciweavers

2513 search results - page 361 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CGO
2009
IEEE
15 years 5 months ago
Techniques for Region-Based Register Allocation
—Register allocation is an important component of every compiler and numerous studies have investigated ways to improve allocation quality or reduce allocation time. However, tec...
Ivan D. Baev
FASE
2009
Springer
15 years 5 months ago
Controller Synthesis from LSC Requirements
Live Sequence Charts (LSCs) is a visual requirements language for specifying reactive system behavior. When modeling and designing open reactive systems, it is often essential to h...
Hillel Kugler, Cory Plock, Amir Pnueli
74
Voted
TASE
2009
IEEE
15 years 5 months ago
Coarse Grained Retrenchment and the Mondex Denial of Service Attacks
Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content — unlike model b...
Richard Banach
77
Voted
FSEN
2009
Springer
15 years 4 months ago
The Interplay between Relationships, Roles and Objects
In this paper we study the interconnection between relationships and roles. We start from the patterns used to introduce relationships in object oriented languages. We show how th...
Matteo Baldoni, Guido Boella, Leendert van der Tor...
COMPSAC
2007
IEEE
15 years 4 months ago
An Automatic Connector Generation Method for Dynamic Architecture
In a component-based system components are basic computation units implementing specific business functions, and their interactions are explicitly represented by connectors. If th...
Yiming Yang, Xin Peng, Wenyun Zhao