Sciweavers

2421 search results - page 2 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
13 years 10 months ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
TAP
2008
Springer
144views Hardware» more  TAP 2008»
13 years 4 months ago
Integrating Verification and Testing of Object-Oriented Software
Formal methods can only gain widespread use in industrial software development if they are integrated into software development techniques, tools, and languages used in practice. A...
Christian Engel, Christoph Gladisch, Vladimir Kleb...
STORAGESS
2005
ACM
13 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
EH
2000
IEEE
123views Hardware» more  EH 2000»
13 years 9 months ago
The Test Vector Problem and Limitations to Evolving Digital Circuits
How do we know the correctness of an evolved circuit? While Evolutionary Hardware is exhibiting its effectiveness, we argue that it is very difficult to design a large-scale digit...
Kosuke Imamura, James A. Foster, Axel W. Krings
SCS
2003
13 years 6 months ago
A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments
The development of safety critical systems is guided by standards. Many standards require the development of a safety case to demonstrate the acceptability of Safety Critical Syst...
Rob Weaver, Jane Fenn, Tim Kelly