In model based formal methods, incompatible tools for different techniques is the norm. However, greater applicability to industrial scale systems increasingly requires combining the strengths of different techniques,...
详细信息
this paper describes a multibody simulation project, developed at the Universit catholique de Louvain and at the Universidad San Fransisco de Quito, as an additional "learning layer" for students in engineer...
详细信息
ISBN:
(纸本)0791847438
this paper describes a multibody simulation project, developed at the Universit catholique de Louvain and at the Universidad San Fransisco de Quito, as an additional "learning layer" for students in engineering. the projects are all based on the use of a symbolic multibody software for generating the equations of motion of real-world applications (usually vehicles). Pedagogically, the use of such software gives the student the opportunity to focus on more enriching aspects, namely: the analysis of a real-world application, the formulation of consistent hypotheses for the considered system, and the multidisciplinary activity at the basis of a complete simulation project (mechanics, numerical methods, computer science and CAD).
As a novel network paradigm, software-Defined Networking (SDN) decouples control logic from data forwarding devices, and introduces a separate control plane to manipulate substrate switches via southbound interface ty...
详细信息
Lack of hearing ability hinders deaf children from mastering grammar in language studies. Unfortunately, such software targeting Malay language is limited. this paper attempts to generate new approach in handling such...
详细信息
this book constitutes the thoroughly refereed post proceedings of the 5th International Haifa Verification conference, HVC 2009, held in Haifa, israel in October 2009. the 11 revised full papers presented together wit...
详细信息
ISBN:
(数字)9783642192371
ISBN:
(纸本)9783642192364
this book constitutes the thoroughly refereed post proceedings of the 5th International Haifa Verification conference, HVC 2009, held in Haifa, israel in October 2009. the 11 revised full papers presented together with four abstracts of invited lectures were carefully reviewed and selected from 23 submissions. the papers address all current issues, challenges and future directions of verification for hardware, software, and hybrid systems and present academic research in the verification of systems, generally divided into two paradigms - formal verification and dynamic verification (testing).
this work describes a Process Improvement Experiment (PIE), that was designed to improve the software testing methodology of Magic software Enterprises Ltd. Magic's business is related to the provision of applicat...
详细信息
ISBN:
(纸本)0780338790
this work describes a Process Improvement Experiment (PIE), that was designed to improve the software testing methodology of Magic software Enterprises Ltd. Magic's business is related to the provision of application development tools supported on a wide range of platforms, operating systems, and networks, and interfacing with many Data Base Management systems. the baseline project is part of a release of Magic Version 8 - Enterprise Edition, that include expanded capability in handling of Web connectivity In the PIE, the Data Base Gateways part of the product were re-tested using new automatic procedures, and were compared to the current manual method. this article mainly focus on the qualitative results of the experiment, rather than the quantitative ones, to serve as an input for organizations who are considering implementation or intend to implement similar methods in their QA process. the project is part of an overall process to raise the level of development technology of Magic software Enterprises from level one on the SEI CMM scale to level two.
this paper exposes how to create reusable components that can be used by developers to implement applications for visually handicapped users. the non visual components are widgets adapted from graphical ones like menu...
详细信息
ISBN:
(纸本)9781424410309
this paper exposes how to create reusable components that can be used by developers to implement applications for visually handicapped users. the non visual components are widgets adapted from graphical ones like menus, list boxes, edit boxes, and they use specific input/output devices and specific interaction principles. they are implemented as components to facilitate the component based development of non visual applications. the contribution of this work in the field of assistive technology is valuable, because there are no existing tools that facilitate the creation of interfaces for the. blind users, and it may considerably improve computer access for this category of users.
the complexity of softwaresystems is continuously growing across a wide range of application domains. System architects are often faced with large complex systems and systems whose semantics may be difficult to under...
详细信息
ISBN:
(纸本)9783642049408
the complexity of softwaresystems is continuously growing across a wide range of application domains. System architects are often faced with large complex systems and systems whose semantics may be difficult to understand, hidden, or even still evolving. Raising the level of abstraction of such systems can significantly improve their usability. We introduce System Grokking(1) - a software architect assistance technology designed to support incremental and iterative user-driven understanding, validation, and evolution of complex softwaresystemsthrough higher levels of abstraction. the System Grokking technology enables semi-automatic discovery, manipulation, and visualization of groups of domain-specific software elements and the relationships between them to represent high-level structural and behavioral abstractions.
the rapid transition to cloud-based infrastructures has introduced a number of uncharted risks, threats, and challenges that are faced by security experts. In particular, concerns surrounding the confidentiality of in...
详细信息
the rapid transition to cloud-based infrastructures has introduced a number of uncharted risks, threats, and challenges that are faced by security experts. In particular, concerns surrounding the confidentiality of information in cloud-based systems and the existence of covert communication channels ought to be addressed. In this paper, we outline a schema for certifying covert channel freeness in cloud-based systems. the proposed schema provides an application of the formal foundation laid out in our previous work and is based on a strategy derived from the necessity and formal verification of the conditions for covert channel existence in cloud-based systems specified using the mathematical framework of Communicating Concurrent Kleene Algebra (C(2)KA). We also discuss how the proposed schema can be used for identifying ways in which an analyst may amend, modify, or redesign a system in order to make it more resilient to covert channels, and to potentially certify it to be free from covert channels on the basis of the non-existence of the potential for communication amongst its agents. (C) 2015the Authors. Published by Elsevier B.V.
暂无评论