Sciweavers

2421 search results - page 8 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ATVA
2009
Springer
141views Hardware» more  ATVA 2009»
14 years 2 months ago
Formal Verification for High-Assurance Behavioral Synthesis
We present a framework for certifying hardware designs generated through behavioral synthesis, by using formal verification to certify the associated synthesis transformations. We ...
Sandip Ray, Kecheng Hao, Yan Chen, Fei Xie, Jin Ya...
IASTEDSE
2004
14 years 9 days ago
Does active guidance improve software inspections? A preliminary empirical study
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...
IPPS
2000
IEEE
14 years 3 months ago
Autonomous Consistency Technique in Distributed Database with Heterogeneous Requirements
Recently, the diversified types of companies have been trying to cooperate among them to cope with the dynamic market and thus integration of their DBs with heterogeneous requirem...
Hideo Hanamura, Isao Kaji, Kinji Mori
IWSSD
2000
IEEE
14 years 3 months ago
An Approach to Preserving Sufficient Correctness in Open Resource Coalitions
Most software that most people use most of the time needs only moderate assurance of fitness for its intended purpose. Unlike high-assurance software, where the severe consequence...
Orna Raz, Mary Shaw
CODASPY
2012
12 years 6 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...