Sciweavers

1210 search results - page 56 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
PROVSEC
2010
Springer
15 years 1 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
VTS
2007
IEEE
100views Hardware» more  VTS 2007»
15 years 10 months ago
Using Scan-Dump Values to Improve Functional-Diagnosis Methodology
In this paper, we identify two main bottlenecks in the functional diagnosis flow and propose new ways to overcome these. Our approach completely eliminates the “Primary Input (P...
Vishnu C. Vimjam, Enamul Amyeen, Ruifeng Guo, Srik...
SIGSOFT
2008
ACM
16 years 4 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
UML
2005
Springer
15 years 9 months ago
Lessons Learned from Developing a Dynamic OCL Constraint Enforcement Tool for Java
Analysis and design by contract allows the definition of a formal agreement between a class and its clients, expressing each party’s rights and obligations. Contracts written in ...
Wojciech J. Dzidek, Lionel C. Briand, Yvan Labiche
KBSE
1998
IEEE
15 years 7 months ago
Identifying Pre-Conditions with the Z/EVES Theorem Prover
Starting from a graphical data model (a subset of the OMT object model), a skeleton of formal specification can be generated and completed to express several constraints and provi...
Yves Ledru