Industrial-strength model-based testing-state of the art and current challenges
J Peleska - arxiv preprint arxiv:1303.1006, 2013 - arxiv.org
As of today, model-based testing (MBT) is considered as leading-edge technology in
industry. We sketch the different MBT variants that-according to our experience-are currently …
industry. We sketch the different MBT variants that-according to our experience-are currently …
[BUCH][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life
R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …
fundamental of all questions-and yet it had never been answered satisfactorily by science …
Web services orchestration and choreography
C Peltz - Computer, 2003 - ieeexplore.ieee.org
Web services orchestration and choreography Page 1 0018-9162/03/$17.00 © 2003 IEEE 46
Computer COVER FEATURE Published by the IEEE Computer Society Web Services …
Computer COVER FEATURE Published by the IEEE Computer Society Web Services …
A brief history of process algebra
JCM Baeten - Theoretical Computer Science, 2005 - Elsevier
This note addresses the history of process algebra as an area of research in concurrency
theory, the theory of parallel and distributed systems in computer science. Origins are traced …
theory, the theory of parallel and distributed systems in computer science. Origins are traced …
[BUCH][B] Introduction to process algebra
W Fokkink - 2013 - books.google.com
Automated and semi-automated manipulation of so-called labelled transition systems has
become an important means in discovering flaws in software and hardware systems …
become an important means in discovering flaws in software and hardware systems …
[BUCH][B] The modelling and analysis of security protocols: the CSP approach
P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …
communication and processing of information, ensuring its confidentiality, integrity …
[BUCH][B] Computer science handbook
AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
RoboChart: modelling and verification of the functional behaviour of robotic applications
Robots are becoming ubiquitous: from vacuum cleaners to driverless cars, there is a wide
variety of applications, many with potential safety hazards. The work presented in this paper …
variety of applications, many with potential safety hazards. The work presented in this paper …
Power considerations in the design of the Alpha 21264 microprocessor
MK Gowan, LL Biro, DB Jackson - … of the 35th Annual Design Automation …, 1998 - dl.acm.org
Power dissipation is rapidly becoming a limiting factor in high performance microprocessor
design due to ever increasing device counts and clock rates. The 21264 is a third generation …
design due to ever increasing device counts and clock rates. The 21264 is a third generation …
[ZITATION][C] Software Engineering, 9/E
I Sommerville - 2011 - Pearson Education India