Sciweavers

1109 search results - page 15 / 222
» Software verification for TinyOS
Sort
View
ICECCS
2007
IEEE
86views Hardware» more  ICECCS 2007»
13 years 11 months ago
What Use is Verified Software?
The world at large cares little for verified software; what it cares about are trustworthy and cost-effective systems that do their jobs well. We examine the value of verified sof...
John M. Rushby
WETICE
2006
IEEE
14 years 1 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
BELL
2000
107views more  BELL 2000»
13 years 7 months ago
Automating software feature verification
A significant part of the call processing software for Lucent's new PathStar access server [FSW98] was checked with automated formal verification techniques. The verification...
Gerard J. Holzmann, Margaret H. Smith
KBSE
2005
IEEE
14 years 1 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
FASE
2001
Springer
13 years 12 months ago
A Formal Object-Oriented Analysis for Software Reliability: Design for Verification
Natasha Sharygina, James C. Browne, Robert P. Kurs...