Sciweavers

16725 search results - page 317 / 3345
» Engineering Software Correctness
Sort
View
KBSE
2000
IEEE
15 years 8 months ago
Exploring the Design of an Intentional Naming Scheme with an Automatic Constraint Analyzer
Lightweight formal modeling and automatic analysis were used to explore the design of the Intentional Naming System (INS), a new scheme for resource discovery in a dynamic network...
Sarfraz Khurshid, Daniel Jackson
COMPSAC
2009
IEEE
15 years 8 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Undergraduate Software Engineering Curriculum Enhancement via Human-Computer Interaction
More needs to be done to train students to deliver usable software. The current Software Engineering curriculum includes Human-Computer Interaction (HCI) topics in terms of a lect...
Stephanie Ludi
FOSSACS
2006
Springer
15 years 8 months ago
Distributed Unfolding of Petri Nets
Some recent Petri net-based approaches to fault diagnosis of distributed systems suggest to factor the problem into local diagnoses based on the unfoldings of local views of the sy...
Paolo Baldan, Stefan Haar, Barbara König
CSMR
2008
IEEE
15 years 11 months ago
Hecataeus: A What-If Analysis Tool for Database Schema Evolution
Databases are continuously evolving environments, where design constructs are added, removed or updated rather often. Small changes in the database configurations might impact a l...
George Papastefanatos, Fotini Anagnostou, Yannis V...