• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38
Next 10 →

Automating Formal Proofs for Reactive Systems

by Daniel Ricketts, Valentin Robert, Dongseok Jang, Zachary Tatlock, Sorin Lerner
"... Implementing systems in proof assistants like Coq and proving their correctness in full formal detail has consistently demonstrated promise for making extremely strong guarantees about critical soft-ware, ranging from compilers and operating systems to databases and web browsers. Unfortunately, thes ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
expending effort comparable to the manual verification of a single system. A cru-cial insight of our approach is simultaneously designing both (1) a domain-specific language (DSL) for expressing reactive systems and their correctness properties and (2) proof automation which exploits the constrained

Exploiting SAT and SMT techniques for automated reasoning and ontology manipulation in description logics

by Michele Vescovi, Prof Roberto Sebastiani , 2011
"... The quest of efficient and scalable reasoning procedures arising from the area of Descrip-tion Logics and its notable applications in the prominent domains of Semantic Web and bio-medical ontologies, on one hand, and the wide variety of mature and efficient tech-nologies offered by the SAT research ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
area, on the other hand, motivated our research. In this thesis we explore the idea of exploiting the power and efficiency of state-of-the-art SAT-based and SMT-based techniques for automated reasoning and ontology manipula-tion in Description Logics, proposing a valid alternative to the traditional

Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures

by Mohemed Almorsy, John Grundy, Amani S. Ibrahim
"... Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications ’ security. Hackers can easily exploit vuln ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications ’ security. Hackers can easily exploit

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
sociological theory able to grasp emerging forms of social organization and con ict. This theory is still in its explorator y stage, and should remain, like all relevant theories, as a work in progress open to recti cation by empirical research. Because I am trying to distill theory from observation, I

Formalization of Web Security Patterns ASHISH KUMAR DWIVEDI1

by Santanu Kumar Rath
"... Abstract. Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to se-cure the information assets associated with any software system, organizations plan to desi ..."
Abstract - Add to MetaCart
. In this study, an attempt has been made to compose security patterns for the web-based application. Subsequently, a formal modeling approach for the composition of security patterns is presented. In order to maximize comprehensibility, Unified Modeling Language (UML) notations are used to represent structural

Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions

by Valentin Razmov, Daniel R. Simon - In Proceedings of 17th Annual Computer Security Applications Conference , 2001
"... Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result from implicit assumptions made by an application about its inputs. One approach to defending against their exploitation is ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
process based on a simple formal description of a broad class of assumptions about the inputs to an application. Focusing on the back-end server application case, we have prototyped an easy-to-use tool that generates server-side filtering scripts. These can then be quickly installed on a front-end web

A graph-based approach towards discerning inherent structures in a digital library of formal mathematics

by Lori Lorigo, Jon Kleinberg, Richard Eaton, Robert Constable - In Lecture Notes in Computer Science , 2004
"... Abstract. As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, it becomes increasingly valuable to find automated means to manage this data and capture semantics such as rel ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
dependencies. By exploiting this link structure, we show how one may extract organizational and relatedness information from a collection of digital formal math. We discuss the value of the information we can extract, yielding potential applications in math search tools, theorem proving, and education.

Abstract Automated Vulnerability Analysis Using AI Planning

by Steven Harp, Johnathan Gohde, Thomas Haigh, Mark Boddy
"... As networked systems become more complex, and they support more critical applications, there is a compelling need to augment the Red Team approach to vulnerability analysis with more formal, automated methods. Artificial Intelligence (AI) Planning, with its welldeveloped theory and rich set of tools ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
As networked systems become more complex, and they support more critical applications, there is a compelling need to augment the Red Team approach to vulnerability analysis with more formal, automated methods. Artificial Intelligence (AI) Planning, with its welldeveloped theory and rich set

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy

QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS

by V. Rhymend, Uthariaraj P. Mercy, Florence A. Geetha
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract - Add to MetaCart
to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems
Next 10 →
Results 1 - 10 of 38
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University