Sciweavers

950 search results - page 152 / 190
» Software model checking with SPIN
Sort
View
133
Voted
SIGSOFT
2005
ACM
16 years 3 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
138
Voted
CADE
2009
Springer
15 years 9 months ago
Interpolant Generation for UTVPI
Abstract. The problem of computing Craig interpolants in SMT has recently received a lot of interest, mainly for its applications in formal verification. Efficient algorithms for ...
Alessandro Cimatti, Alberto Griggio, Roberto Sebas...
129
Voted
FTRTFT
1998
Springer
15 years 7 months ago
On the Need for Practical Formal Methods
A controversial issue in the formal methods community is the degree to which mathematical sophistication and theorem proving skills should be needed to apply a formal method. A fun...
Constance L. Heitmeyer
COMPSAC
2006
IEEE
15 years 8 months ago
Testing Scenario Implementation with Behavior Contracts
This paper presents behavior contracts as a new assertion mechanism and a tool that uses such contracts to support the testing of Object-Oriented (OO) systems. A behavior contract...
Donglin Liang, Kai Xu 0002
124
Voted
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
15 years 8 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu