Browse by all authors Browse By Author Name - Wildman,+L

Browse Results (16 results found)

Subscribe to the RSS feed for this result setSubscribe to the RSS feed for this result set

  Abstract Views File Downloads Thomson Reuters Web of Science Citation Count Scopus Citation Count Altmetric Score
McComb, T. and Wildman, L. (2007). A combined approach for information flow analysis in fault tolerant hardware. In: J. S. Dong and J. Sun, Engineering Complex Computer Systems 2007. 12th IEEE International Conference on Engineering Complex Computer Systems 2007 (ICECCS 2007), Auckland, New Zealand, (117-128). 11-14 July 2007. doi:10.1109/ICECCS.2007.5 98   0 Cited 0 times in Scopus0 0
Hamilton, N, Hazel, D, Kearney, P, Traynor, O and Wildman, L (1998). A complete formal development using Cogito. In: Proceedings of the 21st Australasian Computer Science Conference, Acsc'98. 21st Australasian Computer Science Conference (ACSC 98), Perth Australia, (319-330). Feb 04-06, 1998. 34   0
Wildman, L. P. (2001) A formal basis for a program compilation proof tool Brisbane: Software Verification Research Cen. Univ of Qld 48  
Rae, A. J. and Wildman, L. P. (2003). A taxonomy of attacks on secure devices. In: J. Slay, Proceedings of the Fourth Australian Information Warfare and IT Security Conference. The Fourth Australian Information Warfare and IT Security Conference, Adelaide, (251-264). 20-21 November, 2003. 69  
Ngui, J., Strooper, P. A., Wildman, L. and Wojcicki, M. (2007). Comparing the cost-effectiveness of statically analysing and model checking concurrent java components for deadlocks. In: J. Grundy and J. Han, Proceedings of the 2007 Australian Software Engineering Conference (ASWEC '07). 18th Australian Conference on Software Engineeing (ASWEC '07), Melbourne, Australia, (223-232). 10-13 April 2007. doi:10.1109/ASWEC.2007.16 80   0 Cited 2 times in Scopus2 0
Rae, A., Fidge, C. and Wildman, L. (2006) Fault evaluation for security-critical communications devices. Computer, 39 5: 61-68. doi:10.1109/MC.2006.161 47   3 Cited 5 times in Scopus5 0
Kearney, P. F. and Wildman, L. P. (1999). From formal specifications to Ada Programs. In: J. Edwards, Australian Computer Science Communications: 22nd Australasian Computer Science Conference (ACSC'99). ACSC'99, Auckland, NZ, (193-204). 18 - 21 Jan, 1999. 21  
Duke, R. W., Wildman, L. P. and Long, B. J. (2003). Modelling Java concurrency with Object-Z. In: A. Cerone and P. Lindsay, Proceedings of the First International Conference on Software Engineering and Formal Methods. First International Conference on Software Engineering and Formal Methods 2003, Brisbane, Australia, (173-181). 25-26 September 2003. doi:10.1109/SEFM.2003.1236219 65   1 0
Long, B. J., Duke, R. W., Goldson, D. W., Strooper, P. A. and Wildman, L. P. (2004). Mutation-based exploration of a method for verifying concurrent Java components. In: B. Monien, Proceedings of the Eighteenth International Parallel and Distributed Processing Symposium (IPDPS 2004). The Eighteenth International Parallel and Distributed Processing Symposium (IPDPS 2004), Santa Fe, New Mexico, (265-1-265-8). 26-30 April 2004. doi:10.1109/IPDPS.2004.1303338 64   0
Wildman, L. P. (2002). Requirements reformulation using formal specification: A case study. In: C. Lakos, R. Esser, L.M. Kristensen and J. Billington, Formal Methods in Software Engineering and Defence Systems 2002 - Proceedings of the Workshops on Software Engineering and Formal Methods and Formal Methods Applied to Defence Systems. 23rd International Conference on Application and Theory of Petri Nets, Adelaide, Australia, (75-83). 24-28 June, 2002. 66  
McComb, T. J. and Wildman, L. P. (2005). SIFA: A tool for evaluation of high-grade security devices. In: C. Boyd and J. M. Gonzalez Nieto, Proceedings of the 10th Australasian Conference on Information Security and Privacy. Australasian Conference on Information Security and Privacy 2005 (ACISP 2005), Brisbane, Australia, (230-241). 4-6 July, 2005. doi:10.1007/b137750 63   6 Cited 8 times in Scopus8 0
Wildman, L. P., Long, B. J. and Strooper, P. A. (2004). Testing java interrupts and timed waits. In: D. Bae and W. Chu, Proceedings of the Eleventh Asia-Pacific Software Engineering Conference (APSEC 2004). The Eleventh Asia-Pacific Software Engineering Conference (APSEC 2004), Busan, Korea, (438-447). 30 November-3 December 2004. doi:10.1109/APSEC.2004.97 51   1 Cited 5 times in Scopus5 0
Wildman, L., Fidge, C. and Carrington, D. (2002) The Variety of Variables in Automated Real-Time Refinement. Technical Report 02-38, Software Verification Research Centre, School of Information Technology, The University of Queensland. 326 581
Wildman, L. P. and Fidge, C. J. (2001) The variety of variables in computer-aided real-time programming Brisbane: Software Verification Research Cen. Univ of Qld 42  
Suess, J. G., Pop, A., Fritzon, P. and Wildman, L. (2008). Towards integrated model-driven testing of SCADA systems using the Eclipse Modeling Framework and Modelica. In: 2008 Australian Software Engineering Conference: Proceedings. 19th Australian Software Engineering Conference 2008 (ASWEC 2008), Perth, Australia, (149-159). 25-28 March 2008. doi:10.1109/ASWEC.2008.4483203 92   Cited 3 times in Scopus3 0
Kim, S. K., Wildman, L. P. and Duke, R. W. (2005). UML approach to the generation of test sequences for Java-based concurrent systems. In: P. Strooper, Proceedings of the 2005 Australian Software Engineering Conference. 2005 Australian Software Engineering Conference, Brisbane, Australia, (100-109). 29 March-1 April 2005. doi:10.1109/ASWEC.2005.11 78 45 1 Cited 7 times in Scopus7 0