Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Reliability (D.4.5) > Verification (D.4.5...)  
 
Options:
 
  1-9 of 9 Reviews about "Verification (D.4.5...)": Date Reviewed
  Formal verification of control system software
Garoche P., PRINCETON UNIVERSITY PRESS, Princeton, NJ, 2019. 224 pp.  Type: Book (978-0-691181-30-1)

This outstanding work manages to deal with key topics, many of which are highly advanced, while also being encyclopedic (in a good sense) within a mere 200 pages. In spite of its advanced nature, all levels of reader will be informed o...

May 10 2021
  Beyond subterm-convergent equational theories in automated verification of stateful protocols
Dreier J., Duménil C., Kremer S., Sasse R.  POST 2017 (Proceedings of the 6th International Conference on Principles of Security and Trust, Uppsala, Sweden, Apr 22-29, 2017) 117-140, 2017.  Type: Proceedings

The Tamarin Prover, a protocol analyzer tool for security protocols with cryptographic primitives, accepts protocols including cryptographic primitives such as encryption, signatures, and hash functions. More advanced primitives are al...

Oct 26 2017
  Embedded software verification and debugging
Lettnin D., Winterholer M., Springer International Publishing, New York, NY, 2017.  Type: Book (9781461422655)

Speaking about embedded software and hardware is related to speaking about critical systems, which by definition must be reliable systems with no failures at all. Or, in case of failures, systems must have enough intelligence to operat...

Jul 26 2017
  Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security 22(6): 867-912, 2014.  Type: Article

With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authent...

Aug 20 2015
  Enforcing structural regularities in software using IntensiVE
Brichau J., Kellens A., Castro S., DHondt T. Science of Computer Programming 75(4): 232-246, 2010.  Type: Article

One way to make programs more comprehensible and maintainable is to ensure that they follow appropriate conventions, expressed as design patterns, coding conventions, and so forth. Typically, this is done by training or exhortation: pr...

Oct 4 2010
  Mutation analysis and constraint-based criteria: results from an empirical evaluation in the context of software testing
Soares I., Vergilio S. Journal of Electronic Testing: Theory and Applications 20(4): 439-445, 2004.  Type: Article

We are sometimes able to show that one testing criterion is stronger than another in some sense: for example, branch coverage (namely, covering all the edges in a program graph) includes statement coverage (which just ensures all nodes...

Nov 10 2005
  Using program transformations to provide safety properties for real-time systems
Tsai G., Wang S. Real-Time Systems 27(2): 191-207, 2004.  Type: Article

Tsai has been investigating the reliability of real-time systems for about a decade; the references section of this paper lists many of her previous papers. Wang’s work has been previously published, but this is her first rea...

Feb 23 2005
  Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator
Aharon A., Dorfman B., Gofman E., Leibowitz M., Schwartzburd V., Bar-David A. IBM Systems Journal 30(4): 527-538, 1991.  Type: Article

This journal issue contains a set of papers on APL collected for its 25th birthday. Rather than analyze them in the order in which they were printed, I have grouped them into four classes: general features of APL, implementation, appli...

Dec 1 1993
  A Specification and Verification Method for Preventing Denial of Service
Yu C., Gligor V. IEEE Transactions on Software Engineering 16(6): 581-592, 1990.  Type: Article

The authors present a specification and verification method for preventing denial of service in the absence of failure and of integrity violations. They introduce a service-specification model to verify the absence of denial of servic...

Feb 1 1991
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy