Sciweavers

1376 search results - page 182 / 276
» Model-Driven Software Verification
Sort
View
110
Voted
ITICSE
1999
ACM
15 years 7 months ago
Laboratory experiment with the 3RolesPlaying method
The paper addressesthe problem of making experiments for software engineering during laboratories. There is a need for experimental investigations. If experiments are performed in...
Anna E. Bobkowska
ADAEUROPE
1997
Springer
15 years 7 months ago
Systematic Unit-Testing of Ada Programs
The systematic test is an inevitable part of the verification and validation process for software. Overall support for all testing activities is currently not available in a singl...
Joachim Wegener, Ines Fey
FASE
2008
Springer
15 years 5 months ago
A Logic of Graph Constraints
Abstract. Graph constraints were introduced in the area of graph transformation, in connection with the notion of (negative) application conditions, as a form to limit the applicab...
Fernando Orejas, Hartmut Ehrig, Ulrike Prange
114
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
142
Voted
OOPSLA
2000
Springer
15 years 7 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang