Sciweavers

714 search results - page 93 / 143
» Verification and Compliance Testing
Sort
View
HASE
2007
IEEE
14 years 3 months ago
On the Verifiability of Programs Written in the Feature Language Extensions
High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Wu-Hon F. Leung
IJIT
2004
13 years 10 months ago
Modeling Biology Inspired Reactive Agents Using X-machines
Recent advances in both the testing and verification of software based on formal specifications of the system to be built have reached a point where the ideas can be applied in a p...
George Eleftherakis, Petros Kefalas, Anna Sotiriad...
ICSM
2002
IEEE
14 years 1 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
SIGMOD
2007
ACM
186views Database» more  SIGMOD 2007»
14 years 8 months ago
Fg-index: towards verification-free query processing on graph databases
Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph databases, it has become more and more demanding to e...
James Cheng, Yiping Ke, Wilfred Ng, An Lu
ICCV
2007
IEEE
14 years 10 months ago
A Study of Face Recognition as People Age
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...