Sciweavers

714 search results - page 43 / 143
» Verification and Compliance Testing
Sort
View
IJSEKE
2011
165views more  IJSEKE 2011»
14 years 4 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
126
Voted
SIGCSE
2006
ACM
131views Education» more  SIGCSE 2006»
15 years 6 months ago
An undergraduate course on software bug detection tools and techniques
The importance of software bug detection tools is high with the constant threat of malicious activity. Companies are increasingly relying on software bug detection tools to catch ...
Eric Larson
362
Voted

Dataset
801views
14 years 1 months ago
VADANA: Vims Appearance Dataset for facial image ANAlysis
Analysis of face images has been the topic of in-depth research with wide spread applications. Face recognition, verification, age progression studies are some of the topics under ...
87
Voted
EGOV
2005
Springer
15 years 6 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller
FSEN
2007
Springer
15 years 4 months ago
Test Selection Criteria for Quantifier-Free First-Order Specifications
This paper deals with test case selection from axiomatic specifications whose axioms are quantifier-free first-order formulae. Test cases are modeled as ground formulae and any spe...
Marc Aiguier, Agnès Arnould, Pascale Le Gal...