Sciweavers

136 search results - page 20 / 28
» Lightweight Validation of Natural Language Requirements: A C...
Sort
View
GPCE
2009
Springer
14 years 16 hour ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
MODELS
2007
Springer
14 years 1 months ago
A UML Profile for Developing Airworthiness-Compliant (RTCA DO-178B), Safety-Critical Software
Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
Gregory Zoughbi, Lionel C. Briand, Yvan Labiche
CIBSE
2008
ACM
13 years 9 months ago
Using Refinement Checking as System Testing
Abstract. Software testing is an expensive and time-consuming activity; it is also error-prone due to human factors. But, it still is the most common effort used in the software in...
Cristiano Bertolini, Alexandre Mota
SIGADA
2004
Springer
14 years 22 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
14 years 20 days ago
On polynomial-time preference elicitation with value queries
Preference elicitation — the process of asking queries to determine parties’ preferences — is a key part of many problems in electronic commerce. For example, a shopping age...
Martin Zinkevich, Avrim Blum, Tuomas Sandholm