Sciweavers

605 search results - page 2 / 121
» A strategy for efficiently verifying requirements
Sort
View
DALT
2008
Springer
13 years 6 months ago
Abstracting and Verifying Strategy-Proofness for Auction Mechanisms
ing and Verifying Strategy-proofness for Auction Mechanisms E. M. Tadjouddine, F. Guerin, and W. Vasconcelos Department of Computing Science, King's College, University of Abe...
Emmanuel M. Tadjouddine, Frank Guerin, Wamberto We...
REFSQ
2009
Springer
13 years 11 months ago
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies
[Context and motivation] In market-driven product development of software intensive products large numbers of requirements threaten to overload the development organization. It is ...
Mahvish Khurum, Tony Gorschek, Lefteris Angelis, R...
ACSAC
2009
IEEE
13 years 9 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
ICIP
2000
IEEE
13 years 9 months ago
Compressed Domain MPEG-2 Video Editing with VBV Requirement
A novel method is proposed to achieve efficient MPEG-2 video editing in compressed domain while preserving Video Buffer Verifier (VBV) requirements. Different cases are determined...
Ren Egawa, A. Aydin Alatan, Ali N. Akansu
ISSRE
2010
IEEE
13 years 3 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...