Sciweavers

714 search results - page 125 / 143
» Certifying Model Checkers
Sort
View
GPCE
2007
Springer
14 years 1 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 1 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
IROS
2006
IEEE
209views Robotics» more  IROS 2006»
14 years 1 months ago
A Toolbox for Easily Calibrating Omnidirectional Cameras
- In this paper, we present a novel technique for calibrating central omnidirectional cameras. The proposed procedure is very fast and completely automatic, as the user is only ask...
Davide Scaramuzza, Agostino Martinelli, Roland Sie...
ASWEC
2005
IEEE
14 years 1 months ago
A UML Approach to the Generation of Test Sequences for Java-Based Concurrent Systems
Starting with a UML specification that captures the underlying functionality of some given Java-based concurrent system, we describe a systematic way to construct, from this speci...
Soon-Kyeong Kim, Luke Wildman, Roger Duke