Sciweavers

1407 search results - page 64 / 282
» Using Use Cases in Executable Z
Sort
View
108
Voted
CSMR
2005
IEEE
15 years 8 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
APN
2008
Springer
15 years 4 months ago
Process Discovery Using Integer Linear Programming
Abstract. The research domain of process discovery aims at constructocess model (e.g. a Petri net) which is an abstract representation of an execution log. Such a Petri net should ...
Jan Martijn E. M. van der Werf, Boudewijn F. van D...
118
Voted
INFSOF
2000
96views more  INFSOF 2000»
15 years 2 months ago
Improving software quality using statistical testing techniques
Cleanroom usage-based statistical testing techniques have been incorporated into the software development process for a program in the Electronic Systems business of Raytheon Comp...
David P. Kelly, Robert Oshana
115
Voted
PDP
2010
IEEE
15 years 8 months ago
DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm
Abstract—Among the numerous DAG scheduling heuristics suitable for heterogeneous systems, the Heterogeneous Earliest Finish Time (HEFT) heuristic is known to give good results in...
Luiz F. Bittencourt, Rizos Sakellariou, Edmundo R....