Sciweavers

713 search results - page 92 / 143
» Formalization, Testing and Execution of a Use Case Diagram
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 3 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
GECCO
1999
Springer
15 years 4 months ago
Infrastructure Work Order Planning Using Genetic Algorithms
Infrastructure management offices plan and complete several thousand small construction projects annually. Effective planning is vital if the public and private sectors are to mai...
E. William East
ISSTA
2009
ACM
15 years 6 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
FM
2008
Springer
77views Formal Methods» more  FM 2008»
15 years 1 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
AISC
2008
Springer
15 years 1 months ago
Parametric Linear Arithmetic over Ordered Fields in Isabelle/HOL
We use higher-order logic to verify a quantifier elimination procedure for linear arithmetic over ordered fields, where the coefficients of variables are multivariate polynomials o...
Amine Chaieb