Sciweavers

2132 search results - page 235 / 427
» Automated software winnowing
Sort
View
ASWEC
2007
IEEE
15 years 11 months ago
Formal Validation of Hierarchical State Machines against Expectations
This paper explains some analyses that can be performed on a hierarchical finite state machine to validate that it performs as intended. Such a hierarchical state machine has tra...
Ian Toyn, Andy Galloway
COMPSAC
2007
IEEE
15 years 11 months ago
An Approach to Adaptive Distributed Execution Monitoring for Workflows in Service-based Systems
Systems based on Service-Oriented Architecture are called service-based systems (SBS), and comprise of computing services offered by various organizations. Users of SBS often requ...
Stephen S. Yau, Dazhi Huang, Luping Zhu
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
87views Biometrics» more  HICSS 2007»
15 years 11 months ago
A Semantic Recognizer Infrastructure for Computing Loop Behavior
Next-generation software engineering is envisioned as a computational discipline that complements human capability through automated computation of software behavior and propertie...
Ali Mili, Tim Daly, Mark Pleszkoch, Stacy J. Prowe...
ICRA
2007
IEEE
178views Robotics» more  ICRA 2007»
15 years 11 months ago
Increased Mars Rover Autonomy using AI Planning, Scheduling and Execution
—This paper presents technology for performing autonomous commanding of a planetary rover. Through the use of AI planning, scheduling and execution techniques, the OASIS autonomo...
Tara A. Estlin, Daniel M. Gaines, Caroline Chouina...