Sciweavers

1356 search results - page 59 / 272
» The ideal of verified software
Sort
View
CL
2008
Springer
14 years 12 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin
TSE
2008
107views more  TSE 2008»
14 years 11 months ago
Interface Grammars for Modular Software Model Checking
We propose an interface specification language based on grammars for modular software model checking. In our interface specification language, component interfaces are specified a...
Graham Hughes, Tevfik Bultan
IPPS
2006
IEEE
15 years 5 months ago
Monitoring remotely executing shared memory programs in software DSMs
Peer-to-Peer (P2P) cycle sharing over the Internet has become increasingly popular as a way to share idle cycles. A fundamental problem faced by P2P cycle sharing systems is how t...
Long Fei, Xing Fang, Y. Charlie Hu, Samuel P. Midk...
CCS
2007
ACM
15 years 3 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
APSEC
2003
IEEE
15 years 5 months ago
Selecting Components: a Process for Context-Driven Evaluation
This paper describes a process for selecting and evaluating candidates for component based software engineering. The process is aimed at developers sourcing components from third ...
Valerie Maxville, Chiou Peng Lam, Jocelyn Armarego