Large-scale scientific computing applications frequently make use of closely-coupled distributed parallel components. The performance of such scientific applications is therefore ...
Lei Zhao, Stephen A. Jarvis, Daniel P. Spooner, Gr...
Large-scale scientific computing applications frequently make use of closely-coupled distributed parallel components. The performance of such applications is therefore dependent o...
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Incomplete, inaccurate, ambiguous, and volatile requirements have plagued the software industry since its inception. The convergence of model-based development and formal methods o...
Steven P. Miller, Alan C. Tribble, Mats Per Erik H...