Verification Across Intellectual Property Boundaries.
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of veri...
المؤلفون الرئيسيون: | Chaki, S, Schallhart, C, Veith, H |
---|---|
مؤلفون آخرون: | Damm, W |
التنسيق: | Journal article |
اللغة: | English |
منشور في: |
Springer
2007
|
مواد مشابهة
-
A brief account of runtime verification.
حسب: Leucker, M, وآخرون
منشور في: (2009) -
Runtime Verification for LTL and TLTL.
حسب: Bauer, A, وآخرون
منشور في: (2011) -
Impartial Anticipation in Runtime-Verification.
حسب: Dong, W, وآخرون
منشور في: (2008) -
Comparing LTL Semantics for Runtime Verification.
حسب: Bauer, A, وآخرون
منشور في: (2010) -
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
حسب: Jha, S, وآخرون
منشور في: (2007)