Sciweavers

35 search results - page 3 / 7
» A Practical Method for Verifying Event-Driven Software
Sort
View
AINA
2007
IEEE
13 years 9 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
FMICS
2010
Springer
13 years 5 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
JCIT
2010
144views more  JCIT 2010»
13 years 1 days ago
A Model for Software Selection with Fuzzy Linguistic Information
With respect to multiple attribute decision making problem with triangular fuzzy linguistic information, in which the attribute weights and expert weights take the form of real nu...
Juchi Hou
EUROMICRO
2000
IEEE
13 years 9 months ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
FORMATS
2004
Springer
13 years 10 months ago
Bounded Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this reg...
Fang Yu, Bow-Yaw Wang, Yao-Wen Huang