Sciweavers

1356 search results - page 221 / 272
» The ideal of verified software
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
HOLOMAS
2009
Springer
15 years 4 months ago
Mobility Model for Tactical Networks
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...
Milan Rollo, Antonín Komenda
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 4 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
ZUM
1992
Springer
15 years 3 months ago
Specification in Fresco
software in the form of abstract classes; and the specification elements of the language can also be used in concrete classes to document the implementations and their development ...
Alan Wills
HIPC
2007
Springer
15 years 3 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri