Verification Across Intellectual Property Boundaries.
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of veri...
Hlavní autoři: | Chaki, S, Schallhart, C, Veith, H |
---|---|
Další autoři: | Damm, W |
Médium: | Journal article |
Jazyk: | English |
Vydáno: |
Springer
2007
|
Podobné jednotky
-
A brief account of runtime verification.
Autor: Leucker, M, a další
Vydáno: (2009) -
Runtime Verification for LTL and TLTL.
Autor: Bauer, A, a další
Vydáno: (2011) -
Impartial Anticipation in Runtime-Verification.
Autor: Dong, W, a další
Vydáno: (2008) -
Comparing LTL Semantics for Runtime Verification.
Autor: Bauer, A, a další
Vydáno: (2010) -
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
Autor: Jha, S, a další
Vydáno: (2007)