Sciweavers

124 search results - page 14 / 25
» Software Safety: Where's the Evidence
Sort
View
ICSE
2009
IEEE-ACM
14 years 2 months ago
Using Bayesian statistical methods to determine the level of error in large spreadsheets
Spreadsheets are ubiquitous with evidence that Microsoft Excel, the leading application in the area, has an install base of 90% on end-user desktops. Nowhere is the usage of sprea...
Leslie Bradley, Kevin McDaid
EUROMICRO
2005
IEEE
14 years 1 months ago
Naked Objects versus Traditional Mobile Platform Development: A Comparative Case Study
It has been suggested that use of the Naked Objects pattern could contribute to business agility of applications and reduce the amount of the application code up to 75 percent in ...
Heikki Keränen, Pekka Abrahamsson
FORMATS
2008
Springer
13 years 9 months ago
Comparing the Expressiveness of Timed Automata and Timed Extensions of Petri Nets
Time dependant models have been intensively studied for many reasons, among others because of their applications in software verification and due to the development of embedded pla...
Jirí Srba
ICSE
2004
IEEE-ACM
14 years 7 months ago
Assume-Guarantee Verification of Source Code with Design-Level Assumptions
Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. To address the "state explosion" problem a...
Dimitra Giannakopoulou, Corina S. Pasareanu, Jamie...
ISORC
2008
IEEE
14 years 1 months ago
Cyber Physical Systems: Design Challenges
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedb...
Edward A. Lee