Sciweavers

36 search results - page 5 / 8
» Safety in Automotive Software: An Overview of Current Practi...
Sort
View
CCS
2005
ACM
14 years 7 days ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
ISSTA
2006
ACM
14 years 19 days ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ECEH
2006
168views Healthcare» more  ECEH 2006»
13 years 8 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard
DM
2002
105views more  DM 2002»
13 years 6 months ago
Research problems
This paper provides an overview of methods and systems developed for record linkage. Modern record linkage begins with the pioneering work of Newcombe and is especially based on t...
FM
1999
Springer
161views Formal Methods» more  FM 1999»
13 years 11 months ago
Combining Theorem Proving and Continuous Models in Synchronous Design
Support for system speci cation in terms of modelling and simulation environments has become a common practice in safety-critical applications. Also, a current trend is the automat...
Simin Nadjm-Tehrani, Ove Åkerlund