Sciweavers

73 search results - page 11 / 15
» Unified Property Specification for Hardware Software Co-Veri...
Sort
View
JISBD
2001
14 years 8 days ago
Conceptual Modeling of Device-Independent Web Applications
Existing tools intended to build and deploy engaging complex Web sites (including functionality) have shown to be inadequate to face the software production process in an unified a...
Jaime Gómez, Cristina Cachero
SPE
2002
105views more  SPE 2002»
13 years 10 months ago
Specifying a role-based guide for learning to work with an enterprise framework
Learning to work with enterprise frameworks requires considerable effort, because of the inherent complexity of all the knowledge that is needed. However, different roles in proje...
Wilhelm Hasselbring, Ralph van den Houdt
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
14 years 6 hour ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
ARITH
1999
IEEE
14 years 3 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
SEC
2004
14 years 8 days ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi