Sciweavers

1516 search results - page 219 / 304
» Trends in Software Verification
Sort
View
CSREASAM
2008
14 years 11 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
RE
2006
Springer
14 years 9 months ago
Requirements quality control: a unifying framework
Literature tends to discuss software (and system) requirements quality control, which includes validation and verification, as a heterogeneous process using a great variety of rel...
Artem Katasonov, Markku Sakkinen
ASE
2005
91views more  ASE 2005»
14 years 9 months ago
Deviation Analysis: A New Use of Model Checking
Inaccuracies, or deviations, in the measurements of monitored variables in a control system are facts of life that control software must accommodate. Deviation analysis can be used...
Mats Per Erik Heimdahl, Yunja Choi, Michael W. Wha...
SAC
2008
ACM
14 years 9 months ago
Decision-making coordination in collaborative product configuration
In Software Product Lines (SPLs), product configuration is a decision-making process in which a group of stakeholders choose features for a product. Unfortunately, current configu...
Marcílio Mendonça, Thiago T. Bartolo...
CASES
2010
ACM
14 years 7 months ago
Real-time unobtrusive program execution trace compression using branch predictor events
Unobtrusive capturing of program execution traces in real-time is crucial in debugging cyber-physical systems. However, tracing even limited program segments is often cost-prohibi...
Vladimir Uzelac, Aleksandar Milenkovic, Martin Bur...