Sciweavers

3281 search results - page 66 / 657
» An Approach to use Executable Models for Testing
Sort
View
FOSSACS
2009
Springer
14 years 3 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
IJCSA
2007
91views more  IJCSA 2007»
13 years 8 months ago
Experiences in Testing Automation of a Family of Functional- and GUI-similar Programs
This article presents experiences in the automation of a testing process. The main goal is the unified testing of not only one program, but a whole family of programs. The family ...
Anna Derezinska, Tomasz Malek
SIGSOFT
2007
ACM
14 years 9 months ago
Program representations for testing wireless sensor network applications
Because of the growing complexity of wireless sensor network applications (WSNs), traditional software development tools are being developed that are specifically designed for the...
Nguyet T. M. Nguyen, Mary Lou Soffa
EUROMICRO
2009
IEEE
14 years 22 days ago
Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies
BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications tha...
Ernst Juhnke, Tim Dörnemann, Bernd Freisleben
ECAIW
1994
Springer
14 years 11 days ago
Representing and Executing Agent-Based Systems
Abstract. In this paper we describe an approach to the representation and implementation of agent-based systems where the behaviour of an individual agent is represented by a set o...
Michael Fisher