Sciweavers

1926 search results - page 284 / 386
» Modeling and Model Checking Software Product Lines
Sort
View
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 10 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
ISSRE
2007
IEEE
15 years 1 months ago
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important ...
Nachiappan Nagappan, Laurie Williams, Mladen A. Vo...
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
15 years 4 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
ICST
2009
IEEE
15 years 6 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
RE
2001
Springer
15 years 4 months ago
Goal-Oriented Requirements Engineering: A Guided Tour
pture, at different levels of abstraction, the various objectives the system under consideration should achieve. Goal-oriented requirements engineering is concerned with the use o...
Axel van Lamsweerde