Sciweavers

682 search results - page 50 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
RE
2010
Springer
13 years 2 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis
IPPS
2006
IEEE
14 years 1 months ago
Workflow fine-grained concurrency with automatic continuation
Workflow enactment systems are becoming an effective solution to ease programming, deployment and execution of distributed applications in several domains such as telecommunicatio...
Giancarlo Tretola, Eugenio Zimeo
SIGSOFT
2004
ACM
14 years 8 months ago
Scaling regression testing to large software systems
When software is modified, during development and maintenance, it is regression tested to provide confidence that the changes did not introduce unexpected errors and that new feat...
Alessandro Orso, Nanjuan Shi, Mary Jean Harrold
DAC
2001
ACM
14 years 8 months ago
Chaff: Engineering an Efficient SAT Solver
Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide practical solutions to ...
Matthew W. Moskewicz, Conor F. Madigan, Ying Zhao,...