Sciweavers

488 search results - page 53 / 98
» Using Model Checking to Generate Tests from Requirements Spe...
Sort
View
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
159
Voted
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
14 years 7 months ago
Generating Representative Views of Landmarks via Scenic Theme Detection
Visual summarization of landmarks is an interesting and non-trivial task with the availability of gigantic community-contributed resources. In this work, we investigate ways to gen...
Yi-Liang Zhao, Yan-Tao Zheng, Xiangdong Zhou, Tat-...
ICCAD
1999
IEEE
148views Hardware» more  ICCAD 1999»
15 years 7 months ago
SAT based ATPG using fast justification and propagation in the implication graph
In this paper we present new methods for fast justification and propagation in the implication graph (IG) which is the core data structure of our SAT based implication engine. As ...
Paul Tafertshofer, Andreas Ganz
RE
2010
Springer
14 years 10 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis
QEST
2006
IEEE
15 years 9 months ago
Compositional Performability Evaluation for STATEMATE
Abstract— This paper reports on our efforts to link an industrial state-of-the-art modelling tool to academic state-of-the-art analysis algorithms. In a nutshell, we enable timed...
Eckard Böde, Marc Herbstritt, Holger Hermanns...