Sciweavers

1548 search results - page 219 / 310
» Estimating Software Vulnerabilities
Sort
View
AGILEDC
2007
IEEE
15 years 5 months ago
Large Build Teams: Help or Hindrance?
Should we use build and deployment teams on large projects? Build and deployment work often emerges as a specialization on project teams. This specialization becomes important on ...
Julian Simpson, Shane Duan
IWPSE
2007
IEEE
15 years 5 months ago
Modification analysis support at the requirements level
Modification analysis is part of most maintenance processes and includes among other activities, early prediction of potential change impacts, feasibility studies, cost estimation...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
QSIC
2007
IEEE
15 years 5 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
CODES
2006
IEEE
15 years 5 months ago
Automatic run-time extraction of communication graphs from multithreaded applications
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Ai-Hsin Liu, Robert P. Dick
ISPW
2006
IEEE
15 years 5 months ago
Spiral Lifecycle Increment Modeling for New Hybrid Processes
The spiral lifecycle is being extended to address new challenges for Software-Intensive Systems of Systems (SISOS), such as coping with rapid change while simultaneously assuring h...
Raymond J. Madachy, Barry W. Boehm, Jo Ann Lane