Sciweavers

1031 search results - page 87 / 207
» On the Formal Development of Safety-Critical Software
Sort
View
87
Voted
WETICE
2006
IEEE
15 years 7 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
111
Voted
ICST
2010
IEEE
14 years 11 months ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
99
Voted
SEW
2005
IEEE
15 years 6 months ago
Bridging the Gap between Systems Design
A challenging problem for software engineering practitioners is moving from high-level system architectures produced by system engineers to deployable software produced by softwar...
David Garlan, William K. Reinholtz, Bradley R. Sch...
121
Voted
SPLC
2010
14 years 11 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
142
Voted
FIDJI
2003
Springer
15 years 6 months ago
Hard Real-Time Implementation of Embedded Software in JAVA
The popular slogan ”write once, run anywhere” effectively renders the expressive capabilities of the Java programming framework for developing, deploying, and reusing target-i...
Jean-Pierre Talpin, Abdoulaye Gamatié, Davi...