Sciweavers

1432 search results - page 100 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 4 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
153
Voted
KBSE
2005
IEEE
15 years 9 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...
158
Voted
ADAEUROPE
2008
Springer
15 years 9 months ago
An Ada 2005 Technology for Distributed and Real-Time Component-Based Applications
: The concept of interface in Ada 2005 significantly facilitates its usage as the basis for a software components technology. This technology, taking benefit of the resources that ...
Patricia López Martínez, José...
103
Voted
FASE
2010
Springer
15 years 6 months ago
Efficient Runtime Assertion Checking of Assignable Clauses with Datagroups
Runtime assertion checking is useful for debugging programs and specifications. Existing tools check invariants as well as method preand postconditions, but mostly ignore assignabl...
Hermann Lehner, Peter Müller
104
Voted
SCSC
2007
15 years 4 months ago
Virtual prototyping as a mechanism for simulation-based design
The concepts of simulation based design and simulation as specification require support from appropriate computing tools. The Virtual Test Bed software continues to evolve to prov...
Roger Dougal, Blake Langland, Antonello Monti