Sciweavers

215 search results - page 22 / 43
» A Case Study on Artefact-Based RE Improvement in Practice
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
99
Voted
KBSE
2006
IEEE
15 years 6 months ago
Modularity Analysis of Logical Design Models
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
Yuanfang Cai, Kevin J. Sullivan
ISSRE
2000
IEEE
15 years 4 months ago
Assessing the Cost-Effectiveness of Inspections by Combining Project Data and Expert Opinion
There is a general agreement among software engineering practitioners that software inspections are an important technique to achieve high software quality at a reasonable cost. H...
Lionel C. Briand, Bernd G. Freimut, Ferdinand Voll...
WSC
2008
15 years 2 months ago
Using simulation in the implementation of an Outpatient Procedure Center
Creation of an Outpatient Procedure Center (OPC) is a complicated endeavor, requiring a detailed understanding of the resources available and the procedures to be performed. Misca...
Todd R. Huschka, Brian T. Denton, Bradly J. Narr, ...
LATINCRYPT
2010
14 years 11 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert