Sciweavers

1356 search results - page 255 / 272
» The ideal of verified software
Sort
View
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 11 months ago
Design and Modeling of a Mems-Based Valveless Pump Driven by an Electromagnetic Force
A novel valveless micro impedance pump is proposed and analyzed in this study. The pump is constructed of a upper glass plate, two glass tubes, a PDMS (polydimethylsilxane) diaphr...
Hsien-Tsung Chang, Chia-Yen Lee, Chih-Yung Wen
TSC
2008
209views more  TSC 2008»
14 years 11 months ago
Effective Web Service Composition in Diverse and Large-Scale Service Networks
Web services are considered to be a potential silver bullet for the envisioned Service Oriented Architecture, in which loosely coupled software components are published, located, a...
Seog-Chan Oh, Dongwon Lee, Soundar R. T. Kumara
COMPUTER
2002
75views more  COMPUTER 2002»
14 years 11 months ago
GUI Testing: Pitfalls and Process
ion, so mapping between GUI events and the underlying code is not straightforward. Code-based coverage criteria do not necessarily address problematic interactions between the GUI&...
Atif M. Memon
JACM
2002
163views more  JACM 2002»
14 years 11 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...
CASES
2010
ACM
14 years 9 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman