Sciweavers

251 search results - page 47 / 51
» A Formal Approach to Test the Robustness of Embedded Systems...
Sort
View
COMPSAC
2008
IEEE
14 years 1 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
ACISP
2006
Springer
14 years 21 days ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
VSTTE
2005
Springer
14 years 5 days ago
Model Checking: Back and Forth between Hardware and Software
The interplay back and forth between software model checking and hardware model checking has been fruitful for both. Originally intended for the analysis of concurrent software, mo...
Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, He...
ENTCS
2007
168views more  ENTCS 2007»
13 years 6 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
PSIVT
2009
Springer
211views Multimedia» more  PSIVT 2009»
13 years 11 months ago
Inclusion of a Second-Order Prior into Semi-Global Matching
Today’s stereo vision algorithms and computing technology allow real-time 3D data analysis, for example for driver assistance systems. A recently developed Semi-Global Matching (...
Simon Hermann, Reinhard Klette, Eduardo Destefanis