Genetic algorithm based fuzzy decision support system for the diagnosis of heart disease
Decision in medical diagnosis is mostly taken by expert's experiences. In many cases, not all
the expert's experiences contribute towards effective diagnosis of a disease. Researchers …
the expert's experiences contribute towards effective diagnosis of a disease. Researchers …
Generating feasible test paths from an executable model using a multi-objective approach
T Yano, E Martins, FL de Sousa - 2010 third international …, 2010 - ieeexplore.ieee.org
Search-based testing techniques using meta-heuristics, like evolutionary algorithms, has
been largely used for test data generation, but most approaches were proposed for white …
been largely used for test data generation, but most approaches were proposed for white …
[PDF][PDF] Built-in self-test and fault diagnosis of fully differential analogue circuits
S Mir, V Kolarik, M Lubaszewski… - Proceedings of the …, 1994 - researchgate.net
An approach to the test and diagnosis of fully differential analogue circuits is described in
this paper. The test approach is based on o-line monitoring via an analogue BIST observer …
this paper. The test approach is based on o-line monitoring via an analogue BIST observer …
An active testing tool for security testing of distributed systems
This paper describes the TestGen-IF tool, that allows the automatic generation of test cases
based on model based active testing techniques. This paper describes the overall …
based on model based active testing techniques. This paper describes the overall …
How web services can be tolerant to intruders through diversification
G Ouffoué, F Zaidi, AR Cavalli… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The efforts and findings of the last decades of research on the formalization and the
verification of Web services have given a certain level of assurance on Web services …
verification of Web services have given a certain level of assurance on Web services …
Model-based attack tolerance
Software-based systems are nowadays complex and highly distributed. In contrast, existing
intrusion detection mechanisms are not always suitable for protecting these systems against …
intrusion detection mechanisms are not always suitable for protecting these systems against …
Applying formal methods to PCEP: an industrial case study from modeling to test generation
I Hwang, AR Cavalli, M Lallali… - … Testing, Verification and …, 2012 - Wiley Online Library
This paper presents the experimental results in applying formal methods to an industrial
protocol for constraint‐based path computation, called Path Computation Element …
protocol for constraint‐based path computation, called Path Computation Element …
Modeling and validation of a mixed-criticality NoC router using the IF language
In Mixed-Criticality Systems (MCS), high-critical real-time and low-critical real-time
applications share the same hardware platform. Today MCS must also be implementable on …
applications share the same hardware platform. Today MCS must also be implementable on …
A formal approach for interoperability testing of security rules
M El Maarabani, I Hwang… - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
The interaction between business communities becomes a crucial requirement due to the
need of exchanging and sharing resources and services. In general, each system defines its …
need of exchanging and sharing resources and services. In general, each system defines its …
Attack tolerance for services-based applications in the cloud
G Ouffoué, F Zaïdi, AR Cavalli - Testing Software and Systems: 31st IFIP …, 2019 - Springer
Web services allow the communication of heterogeneous systems and are particularly
suitable for building cloud applications. Furthermore, such applications must verify some …
suitable for building cloud applications. Furthermore, such applications must verify some …