Sciweavers

1180 search results - page 28 / 236
» Total Functional Software Engineering - Overview Paper
Sort
View
DAC
2002
ACM
15 years 11 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv
INFOCOM
2006
IEEE
15 years 4 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
ISESE
2006
IEEE
15 years 4 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
ITNG
2010
IEEE
15 years 3 months ago
Architectural, Technological and Methodological Aspects Involved in Design and Engineering a Service-Oriented Geographic Intelli
This paper, the third in a series of four papers, describes a subsystem with integrative function named Geographic Intelligence (GI), from SNIRH, The National Water Resource Infor...
Valdevino Siqueira Campos Neto, Fernando Maciel Li...
KBSE
2005
IEEE
15 years 4 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard