Sciweavers

1347 search results - page 101 / 270
» A Web-based requirements analysis tool
Sort
View
IWIA
2005
IEEE
15 years 6 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
81
Voted
SEFM
2005
IEEE
15 years 6 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
98
Voted
HASE
1999
IEEE
15 years 5 months ago
Automatic Dependability Analysis for Supporting Design Decisions in UML
Even though a thorough system specification improves the quality of the design , it is not sufficient to guarantee that a system will satisfy its reliability targets. Within this ...
Andrea Bondavalli, Ivan Mura, István Majzik
WSC
2000
15 years 2 months ago
Product-mix analysis with Discrete Event Simulation
Discrete Event Simulation (DES) has been used as a design and validation tool in various production and business applications. DES can also be utilized for analyzing the product-m...
Raid Al-Aomar
125
Voted
ENTCS
2006
153views more  ENTCS 2006»
15 years 21 days ago
Automatic Complexity Analysis for Programs Extracted from Coq Proof
We describe an automatic complexity analysis mechanism for programs extracted from proofs carried out with the proof assistant Coq. By extraction, we mean the automatic generation...
Jean-Pierre Jouannaud, Weiwen Xu