Sciweavers

489 search results - page 72 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
SIGSOFT
2007
ACM
14 years 11 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
AADEBUG
2005
Springer
14 years 4 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
14 years 3 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
IPPS
1999
IEEE
14 years 2 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
EVOW
2011
Springer
13 years 2 months ago
Market Microstructure: Can Dinosaurs Return? A Self-Organizing Map Approach under an Evolutionary Framework
This paper extends a previous model where we examined the markets’ microstructure dynamics by using Genetic Programming as a trading rule inference engine, and Self Organizing Ma...
Michael Kampouridis, Shu-Heng Chen, Edward P. K. T...