Sciweavers

3792 search results - page 660 / 759
» Techniques for Trusted Software Engineering
Sort
View
94
Voted
CORR
2010
Springer
101views Education» more  CORR 2010»
15 years 22 days ago
Model-Driven Constraint Programming
Constraint programming can definitely be seen as a model-driven paradigm. The users write programs for modeling problems. These programs are mapped to executable models to calcula...
Raphaël Chenouard, Laurent Granvilliers, Rica...
SAC
2008
ACM
15 years 3 days ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...
SAC
2008
ACM
15 years 2 days ago
Test generation and minimization with "basic" statecharts
Model-based testing as a black-box testing technique has grown in importance. The models used represent the relevant features of the system under consideration (SUC), and can also...
Fevzi Belli, Axel Hollmann
137
Voted
TASLP
2010
134views more  TASLP 2010»
14 years 7 months ago
Autoregressive Models of Amplitude Modulations in Audio Compression
We present a scalable medium bit-rate wide-band audio coding technique based on frequency domain linear prediction (FDLP). FDLP is an efficient method for representing the long-ter...
Sriram Ganapathy, Petr Motlícek, Hynek Herm...
CCS
2007
ACM
15 years 4 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...