Sciweavers

1965 search results - page 293 / 393
» On the analysis of interacting pushdown systems
Sort
View
ICSE
2003
IEEE-ACM
14 years 9 months ago
Requirements Discovery during the Testing of Safety-Critical Software
This paper describes the role of requirements discovery during the testing of a safety-critical software system. Analysis of problem reports generated by the integration and syste...
Robyn R. Lutz, Ines Carmen Mikulski
WCRE
2009
IEEE
14 years 3 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
ISMAR
2007
IEEE
14 years 3 months ago
A Method for Predicting Marker Tracking Error
Many Augmented Reality (AR) applications use marker-based vision tracking systems to recover camera pose by detecting one or more planar landmarks. However, most of these systems ...
Russell M. Freeman, Simon J. Juliet, Anthony Steed
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 3 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
AADEBUG
2005
Springer
14 years 2 months ago
Specifying and checking component usage
One of today’s challenges is producing reliable software in the face of an increasing number of interacting components. Our system CHET lets developers define specifications des...
Steven P. Reiss