Sciweavers

1356 search results - page 95 / 272
» The ideal of verified software
Sort
View
COMPSAC
2003
IEEE
15 years 5 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
EUROMICRO
2004
IEEE
15 years 3 months ago
Formally Designing Web Services for Mobile Team Collaboration
We illustrate a symbiotic relationship between existing model oriented specification techniques and web services. Through the formal re-design of a platform for mobile team collab...
Schahram Dustdar, Pascal Fenkam
PLDI
2010
ACM
15 years 3 months ago
Parameterized Verification of Transactional Memories
We describe an automatic verification method to check whether transactional memories ensure strict serializability--a key property assumed of the transactional interface. Our main...
Michael Emmi, Rupak Majumdar, Roman Manevich
CC
2008
Springer
111views System Software» more  CC 2008»
15 years 1 months ago
Java Bytecode Verification for @NonNull Types
Java's annotation mechanism allows us to extend its type system with non-null types. However, checking such types cannot be done using the existing bytecode verification algor...
Chris Male, David J. Pearce, Alex Potanin, Constan...
WSC
1997
15 years 1 months ago
A General Framework for Large Scale Systems Development
This paper describes a general framework for the modeling, design, simulation, and prototyping of large scale systems. The framework uses a coherent set of tools that model the sy...
Aleks Göllü, Farokh H. Eskafi