Sciweavers

1077 search results - page 171 / 216
» Introducing Software Engineering by means of Extreme Program...
Sort
View
COMPSAC
2008
IEEE
15 years 8 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ECBS
2007
IEEE
97views Hardware» more  ECBS 2007»
15 years 8 months ago
A Service-Oriented Extension of the V-Modell XT
The ever growing size and complexity of both technical and business systems requires efficient software engineering approaches to keep development cost under control while still ...
Michael Meisinger, Ingolf Krüger
IUI
2004
ACM
15 years 7 months ago
Classifying and assessing tremor movements for applications in man-machine intelligent user interfaces
We introduce a new intelligent user interface (IUI) and, also, a new methodology to identify the fatigue state for healthy subjects. The fatigue state is determined by means of a ...
Dan Marius Dobrea, Horia-Nicolai L. Teodorescu
ISSRE
2002
IEEE
15 years 6 months ago
Test Reuse in the Spreadsheet Paradigm
Spreadsheet languages are widely used by a variety of end users to perform many important tasks. Despite their perceived simplicity, spreadsheets often contain faults. Furthermore...
Marc Fisher II, Dalai Jin, Gregg Rothermel, Margar...
ISPASS
2010
IEEE
15 years 6 months ago
PEBIL: Efficient static binary instrumentation for Linux
Binary instrumentation facilitates the insertion of additional code into an executable in order to observe or modify the executable's behavior. There are two main approaches t...
Michael Laurenzano, Mustafa M. Tikir, Laura Carrin...