Sciweavers

ICSE
2009
IEEE-ACM
13 years 2 months ago
A generic software framework for role-based Organic Computing systems
Florian Nafz, Frank Ortmeier, Hella Seebach, Jan-P...
ICSE
2009
IEEE-ACM
13 years 2 months ago
A formal model for self-adaptive and self-healing organizations
Robrecht Haesevoets, Danny Weyns, Tom Holvoet, Wou...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Reflecting on self-adaptive software systems
Self-adaptability has been proposed as an effective approach to automate the complexity associated with the management of modern-day software systems. While over the past decade w...
Jesper Andersson, Rogério de Lemos, Sam Mal...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Model Based Functional Testing Using Pattern Directed Filmstrips
Model driven functional system testing generates test scenarios from behavioural and structural models. In order to autmatically generate tests, conditions such as invariants and ...
Tony Clark
ICSE
2009
IEEE-ACM
13 years 2 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Architecting Robustness and Timeliness in a New Generation of Aerospace Systems
Aerospace systems have strict dependability and real-time requirements, as well as a need for flexible resource reallocation and reduced size, weight and power consumption. To cope...
José Rufino, João Craveiro, Paulo Ve...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Self-healing for Pervasive Computing Systems
The development of small wireless sensors and smart-phones, which include various sound, video, motion and location sensors have facilitated new pervasive applications. These perva...
Themistoklis Bourdenas, Morris Sloman, Emil C. Lup...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Configuration and adaptation of binary software components
Existing black-box adaptation techniques are insufficiently powerful for a large class of real-world tasks. Meanwhile, white-box techniques are language-specificand overly invasiv...
Stephen Kell
ICSE
2009
IEEE-ACM
13 years 2 months ago
Semi-automated traceability maintenance: An architectural overview of traceMaintainer
traceMaintainer is a tool that supports an approach for maintaining post-requirements traceability relations after changes have been made to traced model elements. The update of t...
Patrick Mäder, Orlena Gotel, Ilka Philippow