Sciweavers

2935 search results - page 6 / 587
» An Integrated Approach to High Integrity Software Verificati...
Sort
View
WETICE
2006
IEEE
14 years 1 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
13 years 9 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
13 years 11 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu
ADAEUROPE
1998
Springer
13 years 11 months ago
The Ravenscar Tasking Profile for High Integrity Real-Time Programs
Alan Burns, Brian Dobbing, G. Romanski
DAC
2005
ACM
13 years 9 months ago
Matlab extensions for the development, testing and verification of real-time DSP software
The purpose of this paper is to present the required tools for the development, testing and verification of DSP software in Matlab. The paper motivates a DSP Simulator concept tha...
David P. Magee