Sciweavers

489 search results - page 48 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
87
Voted
RE
1999
Springer
15 years 4 months ago
An Integrated Scenario Management Strategy
Scenarios have proven effective for eliciting, describing and validating software requirements; however, scenario management continues to be a significant challenge to practition...
Thomas A. Alspaugh, Annie I. Antón, Tiffany...
TACAS
2010
Springer
255views Algorithms» more  TACAS 2010»
14 years 10 months ago
Satisfiability Modulo the Theory of Costs: Foundations and Applications
Abstract. We extend the setting of Satisfiability Modulo Theories (SMT) by introducing a theory of costs C, where it is possible to model and reason about resource consumption and ...
Alessandro Cimatti, Anders Franzén, Alberto...
91
Voted
GLVLSI
2009
IEEE
150views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Contradictory antecedent debugging in bounded model checking
In the context of formal verification Bounded Model Checking (BMC) has shown to be very powerful for large industrial designs. BMC is used to check whether a circuit satisfies a...
Daniel Große, Robert Wille, Ulrich Kühn...
200
Voted
POPL
2004
ACM
16 years 24 days ago
Global value numbering using random interpretation
We present a polynomial time randomized algorithm for global value numbering. Our algorithm is complete when conditionals are treated as non-deterministic and all operators are tr...
Sumit Gulwani, George C. Necula
AIM
2006
15 years 17 days ago
Comparative Analysis of Frameworks for Knowledge-Intensive Intelligent Agents
maintain awareness of its environment for a long period of time. Additionally, knowledge-intensive agents must be engineered such that their knowledge can be easily updated as envi...
Randolph M. Jones, Robert E. Wray III