233 results on '"Saglietti, Francesca"'
Search Results
2. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes
3. Comparative Evaluation of Security Fuzzing Approaches
4. Constraint-Based Testing for Buffer Overflows
5. Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions
6. Analysis of Informed Attacks and Appropriate Countermeasures for Cyber-Physical Systems
7. Quantitative Reliability Assessment for Mobile Cooperative Systems
8. Reconfiguration Testing for Cooperating Autonomous Agents
9. Target-Specific Adaptations of Coupling-Based Software Reliability Testing
10. Constraint-Based Testing for Buffer Overflows
11. Evolution of Verification Techniques by Increasing Autonomy of Cooperating Agents
12. Software Reliability Testing Covering Subsystem Interactions
13. Data-Driven Inference of Fault Tree Models Exploiting Symmetry and Modularization
14. Software Reliability Assessment Based on the Evaluation of Operational Experience
15. A Testing Pattern for Automatic Control Software Addressing Different Degrees of Process Autonomy and Cooperation
16. Automatic Test Data Generation by Multi-objective Optimisation
17. Classification, Analysis and Detection of Interface Inconsistencies in Safety-Relevant Component-based Systems
18. Location of Checkpoints by Considering Information Reduction
19. The Impact of Voter Granularity in Fault-Tolerant Software on System Reliability and Availability
20. Measurement of Diversity Degree by Quantification of Dissimilarity in the Input Partition
21. Estimation of Failure Correlation in Diverse Software Systems with Dependent Components
22. Considerations on Software Diversity on the Basis of Experimental and Theoretical Work
23. The Impact of Forced Diversity on the Failure Behaviour of Multiversion Software
24. Overview
25. A Theoretical Evaluation of the Acceptance Test in Recovery Block Programming
26. Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets
27. Dynamic Decision on Checkpointing by Use of Reduced Ordered Binary Decision Diagrams
28. Technische Sicherheit und Informationssicherheit: Unterschiede und Gemeinsamkeiten
29. White and grey-box verification and validation approaches for safety- and security-critical software systems
30. Licensing Reliable Embedded Software for Safety-Critical Applications
31. Evolution of Verification Techniques by Increasing Autonomy of Cooperating Agents
32. Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets
33. Safety of computer control systems: challenges and results in software development
34. Veranstaltungsbesprechungen
35. Evidence-Based Verification of Safety Properties Concerning the Cooperation of Autonomous Agents
36. Bewertung der Zuverlässigkeit von Software
37. Quantitative Assessment of Fault-Tolerant Software Architecture
38. Model-driven Structural and Statistical Testing of Robot Cooperation and Reconfiguration
39. Model-based Testing of Cooperating Robotic Systems using Coloured Petri Nets
40. Model-Based Design and Testing of Decisional Autonomy and Cooperation in Cyber-Physical Systems
41. Model-driven Structural and Statistical Testing of Robot Cooperation and Reconfiguration.
42. Quantitative Assessment of Fault-Tolerant Software Architecture
43. Testing the Cooperation of Autonomous Robotic Agents
44. Technische Sicherheit und Informationssicherheit
45. Model-Based Design and Testing of Decisional Autonomy and Cooperation in Cyber-Physical Systems.
46. Testing the cooperation of autonomous robotic agents.
47. Software Reliability Assessment based on Operational Representativeness and Interaction Coverage
48. Session details: Modeling
49. Testing for Dependable Embedded Software
50. Bewertung der Zuverlässigkeit von Software
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.