Sciweavers

3555 search results - page 174 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
MASCOTS
2007
15 years 5 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
121
Voted
LATA
2010
Springer
16 years 1 months ago
Verifying Complex Continuous Real-Time Systems with Coinductive CLP(R)
Timed automata has been used as a powerful formalism for specifying, designing, and analyzing real time systems. We consider the generalization of timed automata to Pushdown Timed ...
Neda Saeedloei and Gopal Gupta
117
Voted
ISSE
2010
15 years 2 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
PPPJ
2009
ACM
15 years 10 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz
DSVIS
1998
Springer
15 years 8 months ago
The Role of Verification in Interactive Systems Design
Abstract. In this paper we argue that using verification in interactive systems development is more than just checking whether the specification of the system has all the required ...
José Creissac Campos, Michael D. Harrison