Sciweavers

6751 search results - page 1234 / 1351
» Engineering Quality Requirements Using Quality Models
Sort
View
FASE
2009
Springer
15 years 5 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
COMPSAC
2001
IEEE
15 years 5 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...
ADAEUROPE
2005
Springer
15 years 3 months ago
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet
This paper presents the design and implementation of RT-EP (Real-Time Ethernet Protocol), which is a software-based token-passing Ethernet protocol for multipoint communications in...
José María Martínez, Michael ...
ISSTA
2010
ACM
15 years 3 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
ICST
2009
IEEE
15 years 8 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
« Prev « First page 1234 / 1351 Last » Next »