Sciweavers

1112 search results - page 132 / 223
» Executing Abstract Test Cases
Sort
View
ESORICS
2010
Springer
15 years 4 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
ISCA
2002
IEEE
141views Hardware» more  ISCA 2002»
15 years 2 months ago
SADL: Simulation Architecture Description Language
This paper introduces the Simulation Architecture Description Language (SADL) developed at the National Aeronautics and Space Administration's Marshall Space Flight Center to...
Kenneth G. Ricks, John M. Weirs, B. Earl Wells
PERCOM
2010
ACM
15 years 1 months ago
A flexible context stabilization approach for self-adaptive application
Abstract—Pervasive applications are characterized by variations in their context of execution. Their correct behavior requires continuous adaptations, accordingly to changes obse...
Russel Nzekwa, Romain Rouvoy, Lionel Seinturier
FIW
2009
138views Communications» more  FIW 2009»
15 years 24 days ago
Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System
Abstract. This paper presents an online detection and resolution method for feature interactions among integrated services in home network systems. To achieve reasonable online det...
Masahide Nakamura, Hiroshi Igaki, Yuhei Yoshimura,...
FASE
2006
Springer
15 years 6 months ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...