Sciweavers

3828 search results - page 614 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
157
Voted
ESSOS
2009
Springer
15 years 11 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
SSIRI
2010
15 years 3 months ago
A Formal Framework for Mutation Testing
— Model-based approaches, especially based on directed graphs (DG), are becoming popular for mutation testing as they enable definition of simple, nevertheless powerful, mutation...
Fevzi Belli, Mutlu Beyazit
ATAL
2011
Springer
14 years 5 months ago
Specifying and applying commitment-based business patterns
Recent work in communications and business modeling emphasizes a commitment-based view of interaction. By abstracting away from implementation-level details, commitments can poten...
Amit K. Chopra, Munindar P. Singh
ICEIS
2000
IEEE
15 years 9 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
145
Voted
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 9 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...