Sciweavers

3555 search results - page 146 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
145
Voted
WCET
2007
15 years 4 months ago
Automatic Amortised Worst-Case Execution Time Analysis
Our research focuses on formally bounded WCET analysis, where we aim to provide absolute guarantees on execution time bounds. In this paper, we describe how amortisation can be us...
Christoph A. Herrmann, Armelle Bonenfant, Kevin Ha...
JOT
2002
52views more  JOT 2002»
15 years 3 months ago
Negotiable Interfaces for Components
es are extended with a factorable, abstract state, and methods of interfaces are extended with state transformation behaviours. A new programming language command, the USE statemen...
Simon D. Kent, Chris Ho-Stuart, Paul Roe
144
Voted
ASWEC
2007
IEEE
15 years 10 months ago
Timed Behavior Trees and Their Application to Verifying Real-Time Systems
Behavior Trees (BTs) are a graphical notation used for formalising functional requirements and have been successfully applied to several case studies. However, the notation curren...
Lars Grunske, Kirsten Winter, Robert Colvin
142
Voted
ISSRE
2003
IEEE
15 years 9 months ago
Reducing wasted development time via continuous testing
Testing is often performed frequently during development to ensure software reliability by catching regression errors quickly. However, stopping frequently to test also wastes tim...
David Saff, Michael D. Ernst
WWW
2008
ACM
16 years 4 months ago
Information "uptrieval": exploring models for content assimilation and aggregation for developing regions
Information Retrieval on the WWW is important because it is hard to find what one is looking for. There is a plethora of information available, and searching relevant information ...
Sheetal K. Agarwal, Arun Kumar, Sougata Mukherjea,...