Sciweavers

1251 search results - page 177 / 251
» A Method for Component-Based Software and System Development
Sort
View
135
Voted
TASE
2009
IEEE
15 years 9 months ago
Fault-Based Test Case Generation for Component Connectors
The complex interactions appearing in service-oriented computing make coordination a key concern in serviceoriented systems. In this paper, we present a fault-based method to gene...
Bernhard K. Aichernig, Farhad Arbab, Lacramioara A...
121
Voted
SEFM
2007
IEEE
15 years 9 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
104
Voted
SIGADA
2004
Springer
15 years 8 months ago
Re-engineering global variables in Ada
This paper describes one method for identifying global variables in Ada procedures and adding them to the parameter list of appropriate procedures. Global variables, ones that are...
Ricky E. Sward, A. T. Chamillard
136
Voted
DIAGRAMS
2004
Springer
15 years 6 months ago
Towards a Default Reading for Constraint Diagrams
Constraint diagrams are a diagrammatic notation which may be used to express logical constraints. They were designed to complement the Unified Modeling Language in the development ...
Andrew Fish, John Howse
102
Voted
COMPSEC
2010
142views more  COMPSEC 2010»
14 years 11 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto