Verification Across Intellectual Property Boundaries.
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of veri...
Үндсэн зохиолчид: | Chaki, S, Schallhart, C, Veith, H |
---|---|
Бусад зохиолчид: | Damm, W |
Формат: | Journal article |
Хэл сонгох: | English |
Хэвлэсэн: |
Springer
2007
|
Ижил төстэй зүйлс
-
A brief account of runtime verification.
-н: Leucker, M, зэрэг
Хэвлэсэн: (2009) -
Runtime Verification for LTL and TLTL.
-н: Bauer, A, зэрэг
Хэвлэсэн: (2011) -
Impartial Anticipation in Runtime-Verification.
-н: Dong, W, зэрэг
Хэвлэсэн: (2008) -
Comparing LTL Semantics for Runtime Verification.
-н: Bauer, A, зэрэг
Хэвлэсэн: (2010) -
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
-н: Jha, S, зэрэг
Хэвлэсэн: (2007)