Sciweavers

1356 search results - page 64 / 272
» The ideal of verified software
Sort
View
SEW
2003
IEEE
15 years 5 months ago
Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper des...
Doron Drusinsky, Garth Watney
SOCRATES
2008
117views Education» more  SOCRATES 2008»
15 years 1 months ago
E-learning by Doing with Computational Logic
E-learning by doing is an important e-learning process, that provides several advantages but that requires a high interactivity degree, not always supported in e-learning contexts...
Federico Chesani, Anna Ciampolini, Paola Mello
ICSE
2009
IEEE-ACM
14 years 9 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
EMSOFT
2006
Springer
15 years 3 months ago
Software partitioning for effective automated unit testing
A key problem for effective unit testing is the difficulty of partitioning large software systems into appropriate units that can be tested in isolation. We present an approach th...
Arindam Chakrabarti, Patrice Godefroid
JOT
2010
153views more  JOT 2010»
14 years 10 months ago
Identification of System Software Components Using Clustering Approach
The selection of software architecture style is an important decision of design stage, and has a significant impact on various system quality attributes. To determine software arc...
Gholamreza Shahmohammadi, Saeed Jalili, Seyed Moha...