Sciweavers

1516 search results - page 163 / 304
» Trends in Software Verification
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
14 years 10 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
IWPSE
2010
IEEE
14 years 8 months ago
An exercise in iterative domain-specific language design
We describe our experiences with the process of designing a domain-specific language (DSL) and corresponding model transformations. The simultaneous development of the language an...
Marcel van Amstel, Mark van den Brand, Luc Engelen
CCR
2011
14 years 5 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
ICESS
2005
Springer
15 years 3 months ago
Semantic Web Based Knowledge Searching System in Mobile Environment
In this paper we propose semantic web-based mobile knowledge searching systems for display Web pages on mobile terminals. The proposed system reduces the time of verification when ...
Dae-Keun Si, Yang-Seung Jeon, Jong-Ok Choi, Young-...
CASC
2009
Springer
180views Mathematics» more  CASC 2009»
14 years 11 months ago
Effective Quantifier Elimination for Presburger Arithmetic with Infinity
We consider Presburger arithmetic extended by infinity. For this we give an effective quantifier elimination and decision procedure which implies also the completeness of our exten...
Aless Lasaruk, Thomas Sturm