Sciweavers

1414 search results - page 63 / 283
» Combining Intruder Theories
Sort
View
ISSTA
1996
ACM
14 years 2 months ago
Predicting Dependability by Testing
In assessing the quality of software, we would like to make engineering judgements similar to those based on statistical quality control. Ideally, we want to support statements li...
Richard G. Hamlet
IJRFITA
2007
103views more  IJRFITA 2007»
13 years 10 months ago
Characterisation of RF propagation in rectangular metal pipes for passive RFID systems
: In this paper, we collect and extend the theory of Radio Frequency (RF) propagation within rectangular metal pipes. This work is motivated by the need to understand the operation...
Darmindra D. Arumugam, Daniel W. Engels
ISSTA
2006
ACM
14 years 3 months ago
Subdomain testing of units and systems with state
This paper extends basic software-testing theory to software components and adds explicit state to the theory. The resulting theory e enough to abstractly model the construction o...
Dick Hamlet
ESOP
2009
Springer
14 years 1 months ago
Handlers of Algebraic Effects
We present an algebraic treatment of exception handlers and, more generally, introduce handlers for other computational effects representable by an algebraic theory. These include ...
Gordon D. Plotkin, Matija Pretnar
MSS
2008
IEEE
112views Hardware» more  MSS 2008»
13 years 10 months ago
Axiomatization of stochastic models for choice under uncertainty
: This paper develops a theory of probabilistic models for risky choices. Part of this theory can be viewed as an extension of the expected utility theory to account for bounded ra...
John K. Dagsvik