[图书][B] Verification, validation, and testing of engineered systems
A Engel - 2010 - books.google.com
Systems' Verification Validation and Testing (VVT) are carried out throughout systems'
lifetimes. Notably, quality-cost expended on performing VVT activities and correcting system …
lifetimes. Notably, quality-cost expended on performing VVT activities and correcting system …
ICFHR 2014 competition on handwritten digit string recognition in challenging datasets (HDSRC 2014)
This paper presents the results of the HDSRC 2014 competition on handwritten digit string
recognition in challenging datasets organized in conjunction with ICFHR 2014. The general …
recognition in challenging datasets organized in conjunction with ICFHR 2014. The general …
A uml/marte model analysis method for uncovering scenarios leading to starvation and deadlocks in concurrent systems
Concurrency problems such as starvation and deadlocks should be identified early in the
design process. As larger, more complex concurrent systems are being developed, this is …
design process. As larger, more complex concurrent systems are being developed, this is …
Genlm: license management for grid and cloud computing environments
M Dalheimer, FJ Pfreundt - … on Cluster Computing and the Grid, 2009 - ieeexplore.ieee.org
Software license management allows independent software vendors (ISVs) to control the
access of their products. It is a fundamental part of the ISVs' business strategy. A wide range …
access of their products. It is a fundamental part of the ISVs' business strategy. A wide range …
[图书][B] An approach to graph-based modeling of network exploitations
W Li - 2005 - search.proquest.com
Computer security professionals and researchers are investigating proactive techniques for
studying network-based attack behavior. Attack modeling is one of these research areas. In …
studying network-based attack behavior. Attack modeling is one of these research areas. In …
Towards the correctness of software behavior in uml: A model checking approach based on slicing
S Van Langenhove - 2006 - biblio.ugent.be
Embedded systems are systems which have ongoing interactions with their environments,
accepting requests and producing responses. Such systems are increasingly used in …
accepting requests and producing responses. Such systems are increasingly used in …
Security Assessment of Software Design using Neural Network
A Adebiyi, J Arreymbi, C Imafidon - arXiv preprint arXiv:1303.2017, 2013 - arxiv.org
Security flaws in software applications today has been attributed mostly to design flaws. With
limited budget and time to release software into the market, many developers often consider …
limited budget and time to release software into the market, many developers often consider …
Verifying web services compositions using UPPAAL
A service composition consists of multiple interacting Web Services that provide a
functionality to meet a specific set of requirements. It is essential to verify that the functional …
functionality to meet a specific set of requirements. It is essential to verify that the functional …
Interactive enhancement of handwritten text through multi-resolution Gaussian
OA Nina - 2012 International Conference on Frontiers in …, 2012 - ieeexplore.ieee.org
Handwritten text found in historical documents is often difficult to read due to issues such as
contrast, noise and degradation. There has been much work on how to process such …
contrast, noise and degradation. There has been much work on how to process such …
Applicability of neural networks to software security
A Adebiyi, J Arreymbi, C Imafidon - 2012 UKSim 14th …, 2012 - ieeexplore.ieee.org
Software design flaws account for 50% software security vulnerability today. As attacks on
vulnerable software continue to increase, the demand for secure software is also increasing …
vulnerable software continue to increase, the demand for secure software is also increasing …