Sciweavers

1342 search results - page 217 / 269
» MEMS Design And Verification
Sort
View
CADE
2008
Springer
15 years 10 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ICALP
2009
Springer
15 years 10 months ago
On Regular Temporal Logics with Past,
The IEEE standardized Property Specification Language, PSL for short, extends the well-known linear-time temporal logic LTL with so-called semi-extended regular expressions. PSL an...
Christian Dax, Felix Klaedtke, Martin Lange
ICSE
2005
IEEE-ACM
15 years 10 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
ICSE
2007
IEEE-ACM
15 years 10 months ago
Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable
Software testing efforts account for a large part of the software development costs. We still struggle, however, to properly prepare students to perform software testing activitie...
Sebastian G. Elbaum, Suzette Person, Jonathan Doku...
ICFP
2005
ACM
15 years 9 months ago
Simple, partial type-inference for System F based on type-containment
We explore partial type-inference for System F based on type-containment. We consider both cases of a purely functional semantics and a call-by-value stateful semantics. To enable...
Didier Rémy