Genetic algorithm based fuzzy decision support system for the diagnosis of heart disease

AK Paul, PC Shill, MRI Rabin… - 2016 5th International …, 2016 - ieeexplore.ieee.org
Decision in medical diagnosis is mostly taken by expert's experiences. In many cases, not all
the expert's experiences contribute towards effective diagnosis of a disease. Researchers …

Generating feasible test paths from an executable model using a multi-objective approach

T Yano, E Martins, FL de Sousa - 2010 third international …, 2010 - ieeexplore.ieee.org
Search-based testing techniques using meta-heuristics, like evolutionary algorithms, has
been largely used for test data generation, but most approaches were proposed for white …

[PDF][PDF] Built-in self-test and fault diagnosis of fully differential analogue circuits

S Mir, V Kolarik, M Lubaszewski… - Proceedings of the …, 1994 - researchgate.net
An approach to the test and diagnosis of fully differential analogue circuits is described in
this paper. The test approach is based on o-line monitoring via an analogue BIST observer …

An active testing tool for security testing of distributed systems

MHE Aouadi, K Toumi, A Cavalli - 2015 10th International …, 2015 - ieeexplore.ieee.org
This paper describes the TestGen-IF tool, that allows the automatic generation of test cases
based on model based active testing techniques. This paper describes the overall …

How web services can be tolerant to intruders through diversification

G Ouffoué, F Zaidi, AR Cavalli… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The efforts and findings of the last decades of research on the formalization and the
verification of Web services have given a certain level of assurance on Web services …

Model-based attack tolerance

G Ouffoué, F Zaidi, AR Cavalli… - 2017 31st International …, 2017 - ieeexplore.ieee.org
Software-based systems are nowadays complex and highly distributed. In contrast, existing
intrusion detection mechanisms are not always suitable for protecting these systems against …

Applying formal methods to PCEP: an industrial case study from modeling to test generation

I Hwang, AR Cavalli, M Lallali… - … Testing, Verification and …, 2012 - Wiley Online Library
This paper presents the experimental results in applying formal methods to an industrial
protocol for constraint‐based path computation, called Path Computation Element …

Modeling and validation of a mixed-criticality NoC router using the IF language

M Dridi, M Lallali, S Rubini, F Singhoff… - Proceedings of the 10th …, 2017 - dl.acm.org
In Mixed-Criticality Systems (MCS), high-critical real-time and low-critical real-time
applications share the same hardware platform. Today MCS must also be implementable on …

A formal approach for interoperability testing of security rules

M El Maarabani, I Hwang… - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
The interaction between business communities becomes a crucial requirement due to the
need of exchanging and sharing resources and services. In general, each system defines its …

Attack tolerance for services-based applications in the cloud

G Ouffoué, F Zaïdi, AR Cavalli - Testing Software and Systems: 31st IFIP …, 2019 - Springer
Web services allow the communication of heterogeneous systems and are particularly
suitable for building cloud applications. Furthermore, such applications must verify some …