Verification Across Intellectual Property Boundaries.
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of veri...
主要な著者: | Chaki, S, Schallhart, C, Veith, H |
---|---|
その他の著者: | Damm, W |
フォーマット: | Journal article |
言語: | English |
出版事項: |
Springer
2007
|
類似資料
-
A brief account of runtime verification.
著者:: Leucker, M, 等
出版事項: (2009) -
Runtime Verification for LTL and TLTL.
著者:: Bauer, A, 等
出版事項: (2011) -
Impartial Anticipation in Runtime-Verification.
著者:: Dong, W, 等
出版事項: (2008) -
Comparing LTL Semantics for Runtime Verification.
著者:: Bauer, A, 等
出版事項: (2010) -
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
著者:: Jha, S, 等
出版事項: (2007)