Sciweavers

1663 search results - page 169 / 333
» Software Reuse and Safety
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
COMPSAC
2008
IEEE
14 years 3 months ago
Service-Oriented Modelling of Automotive Systems
We discuss the suitability of service-oriented computing for the automotive domain. We present a formal high-level language in which complex automotive activities can be modelled ...
Laura Bocchi, José Luiz Fiadeiro, Ant&oacut...
AADEBUG
2005
Springer
14 years 2 months ago
Jockey: a user-space library for record-replay debugging
Jockey is an execution record/replay tool for debugging Linux programs. It records invocations of system calls and CPU instructions with timing-dependent effects and later replays...
Yasushi Saito
EMSOFT
2008
Springer
13 years 11 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...
TSE
2010
110views more  TSE 2010»
13 years 7 months ago
Proofs from Tests
We present an algorithm Dash to check if a program P satisfies a safety property ϕ. The unique feature of the algorithm is that it uses only test generation operations, and nes ...
Nels E. Beckman, Aditya V. Nori, Sriram K. Rajaman...