Sciweavers

1407 search results - page 49 / 282
» Using Use Cases in Executable Z
Sort
View
171
Voted
CASES
2004
ACM
15 years 8 months ago
Memory overflow protection for embedded systems using run-time checks, reuse and compression
Title of thesis: MEMORY OVERFLOW PROTECTION FOR EMBEDDED SYSTEMS USING RUN-TIME CHECKS, REUSE AND COMPRESSION Surupa Biswas, Master of Science, 2004 Thesis directed by: Assistant ...
Surupa Biswas, Matthew Simpson, Rajeev Barua
QEST
2008
IEEE
15 years 9 months ago
Debugging of Dependability Models Using Interactive Visualization of Counterexamples
Abstract—We present an approach to support the debugging of stochastic system models using interactive visualization. The goal of this work is to facilitate the identification o...
Husain Aljazzar, Stefan Leue
150
Voted
FM
2009
Springer
189views Formal Methods» more  FM 2009»
15 years 10 days ago
Model-Based GUI Testing Using Uppaal at Novo Nordisk
Abstract. This paper details a collaboration between Aalborg University and NOVO Nordisk in developing an automatic model-based test generation tool for system testing of the graph...
Ulrik H. Hjort, Jacob Illum Rasmussen, Kim Guldstr...
144
Voted
ZUM
1998
Springer
111views Formal Methods» more  ZUM 1998»
15 years 6 months ago
Combining Specification Techniques for Processes, Data and Time
Abstract. We present a new combination CSP-OZ-DC of three well researched formal techniques for the specification of processes, data and time: CSP [17], Object-Z [36], and Duration...
Ernst-Rüdiger Olderog
CP
2008
Springer
15 years 4 months ago
Perfect Constraints Are Tractable
By using recent results from graph theory, including the Strong Perfect Graph Theorem, we obtain a unifying framework for a number of tractable classes of constraint problems. Thes...
András Z. Salamon, Peter G. Jeavons