This paper addresses the problem of predicting timing properties of multi-tasking component assemblies during the design phase. For real-time applications, it is of vital importan...
Egor Bondarev, Johan Muskens, Peter H. N. de With,...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...