Sciweavers

4250 search results - page 72 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
TSMC
2002
134views more  TSMC 2002»
13 years 8 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
FORTE
1996
13 years 10 months ago
Formal Description Techniques - How Formal and Descriptive are they?
I discuss formal description techniques (FDTs) as they are applied in practice in software and system engineering. Their quality can be measured by their formality, descriptivenes...
Manfred Broy
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 1 months ago
Efficient decision ordering techniques for SAT-based test generation
Model checking techniques are promising for automated generation of directed tests. However, due to the prohibitively large time and resource requirements, conventional model chec...
Mingsong Chen, Xiaoke Qin, Prabhat Mishra
EMSOFT
2008
Springer
13 years 10 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya