Sciweavers

1776 search results - page 297 / 356
» Hypothesis Testing for Module Test in Software Development
Sort
View
FASE
2004
Springer
14 years 2 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
ACSAC
2003
IEEE
14 years 2 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
PASTE
2010
ACM
14 years 1 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
ICECCS
2002
IEEE
85views Hardware» more  ICECCS 2002»
14 years 1 months ago
Syntactic Fault Patterns in OO Programs
Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about OO software. In addition to the simple fact that o...
Roger T. Alexander, Jeff Offutt, James M. Bieman
SEKE
2009
Springer
14 years 1 months ago
Improving Negotiations through Fuzzy Cognitive Maps
In a decision-making process, a systematic method to manage and measure negotiation aspects provides crucial information to negotiators and has emerged as a key factor to determin...
Sérgio Assis Rodrigues, Tiago Santos da Sil...