Sciweavers

1407 search results - page 32 / 282
» Using Use Cases in Executable Z
Sort
View
JCS
1998
338views more  JCS 1998»
15 years 2 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
KBSE
2007
IEEE
15 years 8 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
SIGSOFT
2008
ACM
16 years 3 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
MAGS
2007
82views more  MAGS 2007»
15 years 2 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...
131
Voted
CASES
2009
ACM
15 years 9 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...