Sciweavers

1541 search results - page 143 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
EOR
2008
109views more  EOR 2008»
15 years 4 months ago
Basin-wide cooperative water resources allocation
The Cooperative Water Allocation Model (CWAM) is designed within a general mathematical programming framework for modeling equitable and efficient water allocation among competing...
Lizhong Wang, Liping Fang, Keith W. Hipel
NDSS
2008
IEEE
15 years 10 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ECSA
2008
Springer
15 years 6 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà
IFIP
2007
Springer
15 years 10 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
BIB
2006
84views more  BIB 2006»
15 years 4 months ago
Computational methodologies for modelling, analysis and simulation of signalling networks
This article is a critical review of computational techniques used to model, analyse and simulate signalling networks. We propose a conceptual framework, and discuss the role of s...
David R. Gilbert, Hendrik Fuß, Xu Gu, Richar...