Sciweavers

1663 search results - page 147 / 333
» Software Reuse and Safety
Sort
View
ISSTA
2006
ACM
14 years 3 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
DBSEC
2008
137views Database» more  DBSEC 2008»
13 years 10 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
ICSE
2011
IEEE-ACM
13 years 19 days ago
A lightweight code analysis and its role in evaluation of a dependability case
A dependability case is an explicit, end-to-end argument, based on concrete evidence, that a system satisfies a critical property. We report on a case study constructing a depend...
Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang,...
DATE
2005
IEEE
117views Hardware» more  DATE 2005»
14 years 2 months ago
Low Cost Task Migration Initiation in a Heterogeneous MP-SoC
Run-time task migration in a heterogeneous multiprocessor System-on-Chip (MP-SoC) is a challenge that requires cooperation between the task and the operating system. In task migra...
Vincent Nollet, Prabhat Avasare, Jean-Yves Mignole...
ICCS
2000
Springer
14 years 23 days ago
Conventions and Notations for Knowledge Representation and Retrieval
Abstract. Much research has focused on the problem of knowledge accessibility, sharing and reuse. Specific languages (e.g. KIF, CG, RDF) and ontologies have been proposed. Common c...
Philippe Martin