Sciweavers

1541 search results - page 104 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
JASIS
2006
108views more  JASIS 2006»
15 years 4 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
RAID
2010
Springer
15 years 2 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
TSE
2008
146views more  TSE 2008»
15 years 4 months ago
Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs
We present Delta Execution, a technique that speeds up state-space exploration of object-oriented programs. Statespace exploration is the essence of model checking and an increasin...
Marcelo d'Amorim, Steven Lauterburg, Darko Marinov
CSE
2009
IEEE
15 years 10 months ago
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL
—Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often i...
Elizabeth M. Bonsignore, Cody Dunne, Dana Rotman, ...
POPL
2009
ACM
16 years 4 months ago
Modular code generation from synchronous block diagrams: modularity vs. code size
We study modular, automatic code generation from hierarchical block diagrams with synchronous semantics. Such diagrams are the fundamental model behind widespread tools in the emb...
Roberto Lublinerman, Christian Szegedy, Stavros Tr...