Sciweavers

1432 search results - page 143 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
15 years 3 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
RSP
1999
IEEE
15 years 9 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
RTSS
1997
IEEE
15 years 8 months ago
On-the-fly symbolic model checking for real-time systems
This paper presents an on-the-fly and symbolic algorithm for checking whether a timed automaton satisfies a formula of a timed temporal logic which is more expressive than TCTL....
Ahmed Bouajjani, Stavros Tripakis, Sergio Yovine
EDBTW
2010
Springer
15 years 11 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
149
Voted
ENGL
2008
97views more  ENGL 2008»
15 years 4 months ago
Hybrid Surface Reconstruction Technique for Automotive Applications
Reverse engineering has become a viable technique to create a 3D virtual model of an existing physical object. It enables the reconstruction of body surfaces to create a suitable C...
Gregory M. Lecrivain, Ian F. Kennedy, Arezki Slaou...