Sciweavers

1137 search results - page 53 / 228
» Disciplined Methods of Software Specification: A Case Study
Sort
View
ATVA
2008
Springer
143views Hardware» more  ATVA 2008»
14 years 11 months ago
Automating Algebraic Specifications of Non-freely Generated Data Types
Abstract. Non-freely generated data types are widely used in case studies carried out in the theorem prover KIV. The most common examples are stores, sets and arrays. We present an...
Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif
CASES
2005
ACM
14 years 11 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
ER
2004
Springer
139views Database» more  ER 2004»
15 years 3 months ago
A Sociological Framework for Multi-agent Systems Validation and Verification
Social and intentional behaviours appear as two main components of the agent paradigm. Methods of conventional software engineering do not seem to be appropriate to gain a full kno...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
ICSM
2009
IEEE
15 years 4 months ago
The end-to-end use of source code examples: An exploratory study
This appendix contains the details of our case studies out­ lined in our paper for the 2009 International Conference on Software Maintenance, as well as an expanded discussion se...
Reid Holmes, Rylan Cottrell, Robert J. Walker, J&o...
I3E
2001
196views Business» more  I3E 2001»
14 years 11 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel