Sciweavers

1938 search results - page 97 / 388
» Dependable Software
Sort
View
ICECCS
2000
IEEE
126views Hardware» more  ICECCS 2000»
15 years 8 months ago
Domain Modeling of Software Process Models
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process...
Hassan Gomaa, Larry Kerschberg, Ghulam A. Farrukh
123
Voted
KBSE
2003
IEEE
15 years 8 months ago
Automated Environment Generation for Software Model Checking
A key problem in model checking open systems is environment modeling (i.e., representing the behavior of the execution context of the system under analysis). Software systems are ...
Oksana Tkachuk, Matthew B. Dwyer, Corina S. Pasare...
139
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
A framework for characterization and analysis of software system scalability
The term scalability appears frequently in computing literature, but it is a term that is poorly defined and poorly understood. The lack of a clear, consistent and systematic trea...
Leticia Duboc, David S. Rosenblum, Tony Wicks
152
Voted
ICEB
2004
158views Business» more  ICEB 2004»
15 years 5 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel
105
Voted
ARCS
2010
Springer
15 years 10 months ago
Exploiting Inactive Rename Slots for Detecting Soft Errors
Register renaming is a widely used technique to remove false data dependencies in superscalar datapaths. Rename logic consists of a table that holds a physical register mapping for...
Mehmet Kayaalp, Oguz Ergin, Osman S. Ünsal, M...