Sciweavers

714 search results - page 113 / 143
» Verification and Compliance Testing
Sort
View
SAS
2000
Springer
14 years 6 days ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...
ICPR
2010
IEEE
13 years 11 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
ISSRE
2007
IEEE
13 years 10 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
NSDI
2004
13 years 10 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
GECCO
2008
Springer
257views Optimization» more  GECCO 2008»
13 years 9 months ago
Rapid evaluation and evolution of neural models using graphics card hardware
This paper compares three common evolutionary algorithms and our modified GA, a Distributed Adaptive Genetic Algorithm (DAGA). The optimal approach is sought to adapt, in near rea...
Thomas F. Clayton, Leena N. Patel, Gareth Leng, Al...