Sciweavers

2838 search results - page 226 / 568
» Verifying Controlled Components
Sort
View
91
Voted
NDSS
2005
IEEE
15 years 6 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang
ICECCS
1999
IEEE
83views Hardware» more  ICECCS 1999»
15 years 5 months ago
A Framework for Analyzing Configurations of Deployable Software Systems
Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In s...
Dennis Heimbigner, Richard S. Hall, Alexander L. W...
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 4 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
101
Voted
DAGSTUHL
2003
15 years 2 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
COMPSAC
2007
IEEE
15 years 28 days ago
A Connector-Centric Approach to Aspect-Oriented Software Evolution
Lose sight of the existence of system crosscutting concerns, e.g. safety and quality etc, often causes the system hard to maintain and evolve according to the changing environment...
Yiming Lau, Wenyun Zhao, Xin Peng, Shan Tang