Sciweavers

862 search results - page 112 / 173
» Model Checking Interrupt-Dependent Software
Sort
View
SIGSOFT
2007
ACM
16 years 18 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
SCESM
2006
ACM
269views Algorithms» more  SCESM 2006»
15 years 5 months ago
Inferring operational requirements from scenarios and goal models using inductive learning
Goal orientation is an increasingly recognised Requirements Engineering paradigm. However, integration of goal modelling with operational models remains an open area for which the...
Dalal Alrajeh, Alessandra Russo, Sebastián ...
RE
2001
Springer
15 years 4 months ago
The Single Model Principle
at different levels of abstraction. There are two very different ways of using such languages. One approach is based on the manifestation of a single model, with construction of di...
Richard F. Paige, Jonathan S. Ostroff
KBSE
1998
IEEE
15 years 4 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green
ICSE
1993
IEEE-ACM
15 years 4 months ago
Expressing the Relationships Between Multiple Views in Requirements Specification
Composite systems generally comprise heterogeneous components whose specifications are developed by many development participants. The requirements of such systems are invariably ...
Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein