Sciweavers

687 search results - page 31 / 138
» Specification and Verification of Model Transformations Usin...
Sort
View
105
Voted
KBSE
2005
IEEE
15 years 6 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
SIGSOFT
2003
ACM
16 years 1 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
95
Voted
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
15 years 5 months ago
An Examination of DSLs for Concisely Representing Model Traversals and Transformations
A key advantage for the use of a Domain-Specific Language (DSL) is the leverage that can be captured from a concise representation of a programmer’s intention. This paper report...
Jeff Gray, Gabor Karsai
ICDAR
2007
IEEE
15 years 4 months ago
On the Use of Lexeme Features for Writer Verification
Document examiners use a variety of features to analyze a given handwritten document for writer verification. The challenge in the automatic classification of a pair of documents ...
A. Bhardwaj, A. Singh, Harish Srinivasan, Sargur N...
DATE
1999
IEEE
134views Hardware» more  DATE 1999»
15 years 4 months ago
Verifying Imprecisely Working Arithmetic Circuits
If real number calculations are implemented as circuits, only a limited preciseness can be obtained. Hence, formal verification can not be used to prove the equivalence between th...
Michaela Huhn, Klaus Schneider, Thomas Kropf, Geor...