Zobrazeno 1 - 10
of 154
pro vyhledávání: '"JavaPathFinder"'
Publikováno v:
Fundamental Approaches to Software Engineering ISBN: 9783642005923
FASE
FASE
We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface representing legal usage of the component. Unlike our previous work, this algori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe5c667706307ef8d311ae758d46988c
https://doi.org/10.1007/978-3-642-00593-0_7
https://doi.org/10.1007/978-3-642-00593-0_7
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Lionel C. Briand, Karim Chaouch, Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Frank Zimmer
Publikováno v:
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems-MODELS 18
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems -MODELS '18
info:eu-repo/grantAgreement/EC/H2020/694277
MoDELS
Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems -MODELS '18
info:eu-repo/grantAgreement/EC/H2020/694277
MoDELS
Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environ
One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807
One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______681::d5b3eb3fadb923c004de0cd8c8ae5402
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807
Autor:
Nakade, Radha, Mercer, Eric, Aldous, Peter, Storey, Kyle, Ogles, Benjamin, Hooker, Joshua, Powell, Sheridan Jacob, McCarthy, Jay
Publikováno v:
Innovations in Systems & Software Engineering; Sep2019, Vol. 15 Issue 3/4, p289-306, 18p
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
MUSKE, TUKARAM1, SEREBRENIK, ALEXANDER2
Publikováno v:
ACM Computing Surveys. Apr2023, Vol. 55 Issue 3, p1-39. 39p.
Publikováno v:
International Journal on Artificial Intelligence Tools; Dec2022, Vol. 31 Issue 8, p1-28, 28p
Autor:
FISHER, MICHAEL1 mfisher@liverpool.ac.uk, DENNIS, LOUISE2 l.a.dennis@liverpool.ac.uk, WEBSTER, MATT3 matt@liverpool.ac.uk
Publikováno v:
Communications of the ACM. Sep2013, Vol. 56 Issue 9, p84-93. 10p. 1 Color Photograph, 1 Diagram.