Sciweavers

226 search results - page 17 / 46
» An Investigation of Analysis Techniques for Software Dataset...
Sort
View
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 6 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
RE
2007
Springer
14 years 11 months ago
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
KBSE
2005
IEEE
15 years 5 months ago
On dynamic feature location
Feature location aims at locating pieces of code that implement a given set of features (requirements). It is a necessary first step in every program comprehension and maintenanc...
Rainer Koschke, Jochen Quante
BMCBI
2007
127views more  BMCBI 2007»
14 years 12 months ago
A Latent Variable Approach for Meta-Analysis of Gene Expression Data from Multiple Microarray Experiments
Background: With the explosion in data generated using microarray technology by different investigators working on similar experiments, it is of interest to combine results across...
Hyungwon Choi, Ronglai Shen, Arul M. Chinnaiyan, D...
ISSRE
2002
IEEE
15 years 4 months ago
Fault Contribution Trees for Product Families
Software Fault Tree Analysis (SFTA) provides a structured way to reason about the safety or reliability of a software system. As such, SFTA is widely used in missioncritical appli...
Dingding Lu, Robyn R. Lutz