Sciweavers

980 search results - page 122 / 196
» Modeling Domain Variability in Requirements Engineering with...
Sort
View
SIGSOFT
2010
ACM
14 years 7 months ago
Supporting human-intensive systems
Executing critical systems often rely on humans to make important and sometimes life-critical decisions. As such systems become more complex, the potential for human error to lead...
Lori A. Clarke, Leon J. Osterweil, George S. Avrun...
ISSTA
2006
ACM
15 years 3 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ASPLOS
2009
ACM
15 years 4 months ago
Architectural implications of nanoscale integrated sensing and computing
This paper explores the architectural implications of integrating computation and molecular probes to form nanoscale sensor processors (nSP). We show how nSPs may enable new compu...
Constantin Pistol, Christopher Dwyer, Alvin R. Leb...
ICST
2009
IEEE
15 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ICSM
2005
IEEE
15 years 3 months ago
Annotated Inclusion Constraints for Precise Flow Analysis
Program flow analysis has many applications in software tools for program understanding, restructuring, verification, testing and reverse engineering. There are two important re...
Ana Milanova, Barbara G. Ryder