Sciweavers

805 search results - page 26 / 161
» Location-Based Software Modeling and Analysis: Tropos-Based ...
Sort
View
166
Voted
FASE
2005
Springer
15 years 10 months ago
Termination Criteria for Model Transformation
Model Transformation has become central to most software engineering activities. It refers to the process of modifying a (usually graphical) model for the purpose of analysis (by i...
Hartmut Ehrig, Karsten Ehrig, Juan de Lara, Gabrie...
ISSRE
2003
IEEE
15 years 10 months ago
Assessing Uncertainty in Reliability of Component-Based Software Systems
Many architecture–based software reliability models were proposed in the past. Regardless of the accuracy of these models, if a considerable uncertainty exists in the estimates ...
Katerina Goseva-Popstojanova, Sunil Kamavaram
135
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
SIGSOFT
2004
ACM
15 years 10 months ago
Resolving uncertainties during trace analysis
Software models provide independent perspectives onto software systems. Ideally, all models should use the same model element to describe the same part of a system. Practically, m...
Alexander Egyed
LCTRTS
2010
Springer
15 years 12 months ago
Versatile system-level memory-aware platform description approach for embedded MPSoCs
In this paper, we present a novel system modeling language which targets primarily the development of source-level multiprocessor memory aware optimizations. In contrast to previo...
Robert Pyka, Felipe Klein, Peter Marwedel, Stylian...