Sciweavers

4460 search results - page 83 / 892
» Formal methods for interactive systems
Sort
View
ICFCA
2005
Springer
15 years 3 months ago
Lessons Learned in Applying Formal Concept Analysis to Reverse Engineering
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...
Gabriela Arévalo, Stéphane Ducasse, ...
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 10 months ago
Formalization of the data flow diagram rules for consistency check
In system development life cycle (SDLC), a system model can be developed using Data Flow Diagram (DFD). DFD is graphical diagrams for specifying, constructing and visualizing the ...
Rosziati Ibrahim, Siow Yen yen
HYBRID
2003
Springer
15 years 3 months ago
Estimation of Distributed Hybrid Systems Using Particle Filtering Methods
Abstract. Networked embedded systems are composed of a large number of components that interact with the physical world via a set of sensors and actuators, have their own computati...
Xenofon D. Koutsoukos, James Kurien, Feng Zhao
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 5 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
ACISP
1997
Springer
15 years 2 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng