Sciweavers

1356 search results - page 8 / 272
» The ideal of verified software
Sort
View
ICST
2010
IEEE
14 years 9 months ago
Verified Firewall Policy Transformations for Test Case Generation
Achim D. Brucker, Lukas Brügger, Paul Kearney...
AOSD
2005
ACM
15 years 5 months ago
Modularizing design patterns with aspects: a quantitative study
Design patterns offer flexible solutions to common problems in software development. Recent studies have shown that several design patterns involve crosscutting concerns. Unfortun...
Alessandro F. Garcia, Cláudio Sant'Anna, Ed...
ICECCS
2007
IEEE
86views Hardware» more  ICECCS 2007»
15 years 3 months ago
What Use is Verified Software?
The world at large cares little for verified software; what it cares about are trustworthy and cost-effective systems that do their jobs well. We examine the value of verified sof...
John M. Rushby
KBSE
2005
IEEE
15 years 5 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
APSEC
2001
IEEE
15 years 3 months ago
Tailoring and Verifying Software Process
Process tailoring and verification are very important since project-specific processes are tailored from an organizational process standard and many quality assurance activities a...
Il-Chul Yoon, Sang-Yoon Min, Doo-Hwan Bae