Sciweavers

805 search results - page 18 / 161
» Location-Based Software Modeling and Analysis: Tropos-Based ...
Sort
View
IWSEC
2009
Springer
15 years 4 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
ECAI
2004
Springer
15 years 3 months ago
APPROACH: Decentralised Rotation Planning for Container Barges
This paper presents the engineering and development process of a software tool (APPROACH) that is designed for decentralised rotation planning for container barges in the port of R...
Martijn C. Schut, Michael Kentrop, Mark Leenaarts,...
EMSOFT
2005
Springer
15 years 3 months ago
A structural approach to quasi-static schedulability analysis of communicating concurrent programs
We describe a system as a set of communicating concurrent programs. Quasi-static scheduling compiles the concurrent programs into a sequential one. It uses a Petri net as an inter...
Cong Liu, Alex Kondratyev, Yosinori Watanabe, Albe...
PRDC
2009
IEEE
15 years 4 months ago
Evaluating the Use of Reference Run Models in Fault Injection Analysis
—Fault injection (FI) has been shown to be an effective approach to assessing the dependability of software systems. To determine the impact of faults injected during FI, a given...
Matthew Leeke, Arshad Jhumka
71
Voted
ICSE
2007
IEEE-ACM
15 years 3 months ago
Cost-Benefit Analysis of Software Development Techniques and Practices
Investigations of software development practices, processes, and techniques frequently report separately on the costs and benefits of a phenomenon under study, but rarely adequate...
Hakan Erdogmus