Sciweavers

ESORICS
2005
Springer
13 years 10 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
WORDS
2005
IEEE
13 years 10 months ago
Error Recovery for a Boiler System with OTS PID Controller
We have previously presented initial results of a case study which illustrated an approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour ...
Tom Anderson, Mei Feng, Steve Riddle, Alexander Ro...
IEEEICCI
2005
IEEE
13 years 10 months ago
An empirical study of programmer learning during incremental software development
The paper presents a case study that investigates programmer learning during incremental program development. Dialog based protocol and protocol analysis are used to explore the l...
Shaochun Xu, Václav Rajlich, Andrian Marcus
ICSM
2005
IEEE
13 years 10 months ago
A Case Study of the Release Management of a Health-care Information System
This paper describes a case study of the release management of CS-ECIS, a health-care information system developed by the Dutch software vendor ChipSoft. We performed this case st...
Gerco Ballintijn
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
13 years 10 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman
APSEC
2005
IEEE
13 years 10 months ago
Analysis of the Suzuki-Kasami Algorithm with the Maude Model Checker
We report on a case study in which the Maude model checker has been used to analyze the Suzuki-Kasami distributed mutual exclusion algorithm with respect to the mutual exclusion p...
Kazuhiro Ogata, Kokichi Futatsugi
ERLANG
2006
ACM
13 years 10 months ago
Testing telecoms software with quviq QuickCheck
We present a case study in which a novel testing tool, Quviq QuickCheck, is used to test an industrial implementation of the Megaco protocol. We considered positive and negative t...
Thomas Arts, John Hughes, Joakim Johansson, Ulf Wi...
SKG
2006
IEEE
13 years 10 months ago
Simulate Grid Resource Trading via Cognitive Agent: A Case Study
In this paper, we explore the market-based grid resource trading system from the social perspective and the collaborative computing perspective. We firstly introduce a novel fram...
Yuhui Qiu, Zhixing Huang
IWPC
2006
IEEE
13 years 10 months ago
Studying the Evolution of Software Systems Using Change Clusters
In this paper, we present an approach that examines the evolution of code stored in source control repositories. The technique identifies Change Clusters, which can help managers...
Jay Kothari, Ali Shokoufandeh, Spiros Mancoridis, ...
ISESE
2006
IEEE
13 years 10 months ago
Using observational pilot studies to test and improve lab packages
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
Manoel G. Mendonça, Daniela Cruzes, Josemei...