Sciweavers

615 search results - page 41 / 123
» Research in software engineering: an analysis of the literat...
Sort
View
84
Voted
ICSE
2009
IEEE-ACM
16 years 1 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
102
Voted
KBSE
2006
IEEE
15 years 6 months ago
Modularity Analysis of Logical Design Models
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
Yuanfang Cai, Kevin J. Sullivan
111
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
116
Voted
ER
2006
Springer
169views Database» more  ER 2006»
15 years 2 months ago
A More Expressive Softgoal Conceptualization for Quality Requirements Analysis
Initial software quality requirements tend to be imprecise, subjective, idealistic, and context-specific. An extended characterization of the common Softgoal concept is proposed fo...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
ICSEA
2008
IEEE
15 years 7 months ago
Analysis of a Distributed e-Voting System Architecture against Quality of Service Requirements
In this paper we propose that formal modelling techniques are necessary in establishing the trustworthiness of e-voting systems and the software within. We illustrate how a distri...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy