Sciweavers

718 search results - page 19 / 144
» Toward Models for Forensic Analysis
Sort
View
83
Voted
WCET
2008
14 years 11 months ago
Towards Predicated WCET Analysis
In this paper, we propose the use of constraint logic programming as a way of modeling contextsensitive execution-times of program segments. The context-sensitive constraints are ...
Amine Marref, Guillem Bernat
VMCAI
2009
Springer
15 years 4 months ago
Towards Automatic Stability Analysis for Rely-Guarantee Proofs
The Rely-Guarantee approach is a well-known compositional method for proving Hoare logic properties of concurrent programs. In this approach, predicates in the proof must be proved...
Hasan Amjad, Richard Bornat
RTCSA
2006
IEEE
15 years 3 months ago
Towards an Analysis of Garbage Collection Techniques for Embedded Real-Time Java Systems
From a real-time perspective, the Garbage Collector (GC) introduces unpredictable pauses that are not tolerated by real-time tasks. Real-time collectors eliminate this problem but...
M. Teresa Higuera-Toledano
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
15 years 4 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
71
Voted
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
14 years 10 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot