Sciweavers

6751 search results - page 1256 / 1351
» Engineering Quality Requirements Using Quality Models
Sort
View
126
Voted
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 9 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
133
Voted
SIGSOFT
2006
ACM
16 years 3 months ago
SYNERGY: a new algorithm for property checking
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...
127
Voted
PFE
2001
Springer
15 years 7 months ago
Easing the Transition to Software Mass Customization
Although software mass customization offers the potential for order-of-magnitude improvements in software engineering performance, the up-front cost, level of effort, assumed risk,...
Charles W. Krueger
127
Voted
ICST
2009
IEEE
15 years 9 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
137
Voted
PODC
2011
ACM
14 years 5 months ago
Structuring unreliable radio networks
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model [4,9,10]. This model includes two types...
Keren Censor-Hillel, Seth Gilbert, Fabian Kuhn, Na...
« Prev « First page 1256 / 1351 Last » Next »