Sciweavers

714 search results - page 104 / 143
» Verification and Compliance Testing
Sort
View
FORTE
2008
13 years 10 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
JAISE
2010
141views Algorithms» more  JAISE 2010»
13 years 3 months ago
Emulation framework for the design and development of active RFID tag systems
The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitati...
Razvan Beuran, Junya Nakata, Tetsuya Kawakami, Tak...

Publication
280views
12 years 11 months ago
VADANA: A dense dataset for facial image analysis
Analysis of face images has been the topic of in-depth research with wide spread applications. Face recognition, verification, age progression studies are some of the topics under...
Gowri Somanath, Rohith MV, Chandra Kambhamettu
AOSD
2006
ACM
14 years 2 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...