Sciweavers

714 search results - page 37 / 143
» Verification and Compliance Testing
Sort
View
CCS
2009
ACM
13 years 11 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
ICCD
1992
IEEE
83views Hardware» more  ICCD 1992»
13 years 11 months ago
Logical Verification of the NVAX CPU Chip Design
ct Digital's NVAX high-performance microprocessor has a complex logical design. A rigorous simulation-based verification effort was undertaken to ensure that there were no log...
Walker Anderson
KI
2006
Springer
13 years 7 months ago
Gray Box Robustness Testing of Rule Systems
Due to their simple and intuitive manner rules are often used for the implementation of intelligent systems. Besides general methods for the verification and validation of rule sys...
Joachim Baumeister, Jürgen Bregenzer, Frank P...
COMCOM
2002
143views more  COMCOM 2002»
13 years 7 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
SEW
2006
IEEE
14 years 1 months ago
Pseudo-Exhaustive Testing for Software
Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes adv...
D. Richard Kuhn, Vadim Okun