Sciweavers

489 search results - page 45 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
100
Voted
EMSOFT
2008
Springer
15 years 2 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...
73
Voted
ALIFE
2004
15 years 11 days ago
Building Artificial Life for Play
Toys and play-things are often engineered to replicate the character of real organisms. In the past, inventors often lavished great expense on their life-like automata, their cons...
Alan Dorin
81
Voted
ISSRE
2000
IEEE
15 years 4 months ago
Testing Nondeterminate Systems
The behavior of nondeterminate systems can be hard to predict, since similar inputs at different times can generate different outputs. In other words, the behavior seen during tes...
Tim Menzies, Bojan Cukic, Harshinder Singh, John D...
116
Voted
ICFEM
2005
Springer
15 years 6 months ago
Using Three-Valued Logic to Specify and Verify Algorithms of Computational Geometry
Many safety-critical systems deal with geometric objects. Reasoning about the correctness of such systems is mandatory and requires the use of basic definitions of geometry for th...
Jens Brandt, Klaus Schneider
UIST
2004
ACM
15 years 6 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...