Sciweavers

230 search results - page 32 / 46
» A formal analysis of requirements-based testing
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
ECMDAFA
2010
Springer
207views Hardware» more  ECMDAFA 2010»
14 years 9 days ago
An Automated Approach to Transform Use Cases into Activity Diagrams
Use cases are commonly used to structure and document requirements while UML activity diagrams are often used to visualize and formalize use cases, for example to support automated...
Tao Yue, Lionel C. Briand, Yvan Labiche
ESORICS
1994
Springer
13 years 11 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CCS
2008
ACM
13 years 9 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
JSS
2002
90views more  JSS 2002»
13 years 7 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier