Sciweavers

2050 search results - page 345 / 410
» constraints 2010
Sort
View
SEDE
2010
13 years 5 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
SEMWEB
2010
Springer
13 years 5 months ago
A Self-Policing Policy Language
Abstract. Formal policies allow the non-ambiguous definition of situations in which usage of certain entities are allowed, and enable the automatic evaluation whether a situation i...
Sebastian Speiser, Rudi Studer
SIES
2010
IEEE
13 years 5 months ago
Verification of a CAN bus model in SystemC with functional coverage
Abstract--Many heterogeneous embedded systems, for example industrial automation and automotive applications, require hard-real time constraints to be exhaustively verified - which...
Christoph Kuznik, Gilles B. Defo, Wolfgang Mü...
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
13 years 5 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera
TRIDENTCOM
2010
IEEE
13 years 5 months ago
Experimental Validation and Assessment of Multi-domain and Multi-layer Path Computation
Within the framework of the BONE European Network of Excellence, we setup a multi-domain multi-layer testbed covering three different networks at two distinct locations in Europe. ...
Sebastian Gunreben, Ramon Casellas, Ricardo Mart&i...