Sciweavers

797 search results - page 140 / 160
» Finding Reusable Software Components in Large Systems
Sort
View
SIGSOFT
2003
ACM
14 years 8 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
MSR
2006
ACM
14 years 1 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
SAFECOMP
2007
Springer
14 years 1 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
IWAN
2004
Springer
14 years 1 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
ETFA
2008
IEEE
13 years 9 months ago
Hardware acceleration for verifiable, adaptive real-time communication
Distributed real-time applications implement distributed applications with timeliness requirements. Such systems require a deterministic communication medium with bounded communic...
Sebastian Fischmeister, Insup Lee, Robert Trausmut...