Sciweavers

1121 search results - page 213 / 225
» Building Formal Requirements Models for Reliable Software
Sort
View
ASIACRYPT
2007
Springer
15 years 3 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 1 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
MBEES
2010
14 years 7 months ago
Test Case Integration: From Components to Systems
In a component-based development approach system integration generally implies the packaging and deployment of a group of software components on hardware units, possibly hiding th...
Bernhard Schätz, Christian Pfaller
ICWE
2007
Springer
15 years 3 months ago
Metamodeling the Quality of the Web Development Process' Intermediate Artifacts
WE practices lack an impact on industry, partly due to a WE field that is not quality-aware. In fact, it is difficult to find WE methodologies that pay explicit attention to qualit...
Cristina Cachero, Coral Calero, Geert Poels
MIDDLEWARE
2004
Springer
15 years 2 months ago
A context-aware middleware for applications in mobile Ad Hoc environments
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Carl-Fredrik Sørensen, Maomao Wu, Thirunavu...