Sciweavers

244 search results - page 11 / 49
» A Model of Components with Non-regular Protocols
Sort
View
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
15 years 6 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...
CBSE
2009
Springer
15 years 4 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
UML
2001
Springer
15 years 4 months ago
A UML-integrated Test Description Language for Component Testing
Abstract: A mass market in reusable components demands a high level of component quality, testing being a crucial part of software quality assurance. For components modelled in UML...
Simon Pickin, Claude Jard, Thierry Heuillard, Jean...
COOPIS
2003
IEEE
15 years 5 months ago
Analysing Mailboxes of Asynchronous Communicating Components
Abstract. Asynchronous communications are prominent in distributed and mobile systems. Often consystems consider an abstract point of view with synchronous communications. However ...
Jean-Claude Royer, Michael Xu
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 11 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi