Sciweavers

1541 search results - page 146 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 11 months ago
A Model for Coherent Distributed Memory For Race Condition Detection
—We present a new model for distributed shared memory systems, based on remote data accesses. Such features are offered by network interface cards that allow one-sided operations...
Franck Butelle, Camille Coti
CONCUR
2006
Springer
15 years 8 months ago
Proving Liveness by Backwards Reachability
Abstract. We present a new method for proving liveness and termination properties for fair concurrent programs, which does not rely on finding a ranking function or on computing th...
Parosh Aziz Abdulla, Bengt Jonsson, Ahmed Rezine, ...
SIGOPS
2008
141views more  SIGOPS 2008»
15 years 4 months ago
Using model checkers in an introductory course on operating systems
During the last three years, we have been experimenting with the use of the Uppaal model checker in an introductory course on operating systems for first-year Computer Science stu...
Roelof Hamberg, Frits W. Vaandrager
SAC
2005
ACM
15 years 10 months ago
Performance analysis framework for large software-intensive systems with a message passing paradigm
The launch of new features for mobile phones is increasing and the product life cycle symmetrically decreasing in duration as higher levels of sophistication are reached. Therefor...
Christian Del Rosso