Sciweavers

73 search results - page 2 / 15
» First Steps in the Verified Software Grand Challenge
Sort
View
ICSE
2003
IEEE-ACM
14 years 6 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
VSTTE
2005
Springer
13 years 11 months ago
Lessons from the JML Project
To have impact, a grand challenge should provide a way for diverse research to be integrated in a synergistic fashion. Synergy in the JML project comes from a shared specification...
Gary T. Leavens, Curtis Clifton
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
13 years 10 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
13 years 10 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
FAC
2008
88views more  FAC 2008»
13 years 6 months ago
The certification of the Mondex electronic purse to ITSEC Level E6
Ten years ago the Mondex electronic purse was certified to ITSEC Level E6, the highest level of assuranceforsecuresystems.ThisinvolvedbuildingformalmodelsintheZnotation,linkingthem...
Jim Woodcock, Susan Stepney, David Cooper, John A....