Sciweavers

327 search results - page 45 / 66
» Early Safety Analysis: from Use Cases to Component-based Sof...
Sort
View
JOT
2008
108views more  JOT 2008»
14 years 9 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
ASWEC
2006
IEEE
15 years 3 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICFEM
2009
Springer
15 years 4 months ago
Implementing and Applying the Stocks-Carrington Framework for Model-Based Testing
In this paper we describe the functional features and the architecture of a tool implementing the Stocks-Carrington framework (TTF) for model based testing (MBT). The resulting pro...
Maximiliano Cristiá, Pablo Rodríguez...
IJMI
2007
134views more  IJMI 2007»
14 years 9 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll