Sciweavers

111 search results - page 5 / 23
» Run-Time Verification of Networked Software
Sort
View
72
Voted
PERCOM
2007
ACM
15 years 9 months ago
Ontology-Directed Generation of Frameworks for Pervasive Service Development
Pervasive computing applications are tedious to develop because they combine a number of problems ranging from device heterogeneity, to middleware constraints, to lack of programm...
Charles Consel, Wilfried Jouve, Julien Lancia, Nic...
ICSE
2009
IEEE-ACM
14 years 7 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
96
Voted
AUTONOMICS
2008
ACM
14 years 11 months ago
Verification and semantic parallelization of goal-driven autonomous software
Future space missions such as the Mars Science Laboratory demand the engineering of some of the most complex manrated autonomous software systems. According to some recent estimat...
Damian Dechev, Nicolas Rouquette, Peter Pirkelbaue...
SEUS
2010
IEEE
14 years 7 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei
70
Voted
TKDE
2008
111views more  TKDE 2008»
14 years 9 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...