Sciweavers

3555 search results - page 159 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CORR
2006
Springer
101views Education» more  CORR 2006»
15 years 3 months ago
Fast computation of power series solutions of systems of differential equations
We propose algorithms for the computation of the first N terms of a vector (or a full basis) of power series solutions of a linear system of differential equations at an ordinary ...
Alin Bostan, Frédéric Chyzak, Fran&c...
CIBSE
2008
ACM
15 years 5 months ago
Using Refinement Checking as System Testing
Abstract. Software testing is an expensive and time-consuming activity; it is also error-prone due to human factors. But, it still is the most common effort used in the software in...
Cristiano Bertolini, Alexandre Mota
ASWEC
2008
IEEE
15 years 10 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
FUIN
2006
97views more  FUIN 2006»
15 years 3 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
GECCO
2003
Springer
108views Optimization» more  GECCO 2003»
15 years 9 months ago
Evolutionary Testing of Flag Conditions
Evolutionary Testing (ET) has been shown to be very successful in testing real world applications [16]. However, it has been pointed out [11], that further research is necessary if...
André Baresel, Harmen Sthamer