Sciweavers

260 search results - page 39 / 52
» Risk and Requirements-Based Testing
Sort
View
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 5 months ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
IAW
2003
IEEE
15 years 5 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
IPPS
2003
IEEE
15 years 5 months ago
An Implicitly Parallel Object-Oriented Matrix Library and its Application to Medical Physics
We introduce VLADYMIR, a matrix library that permits the development of array-based code in C++. It is especially useful for numerical simulation tasks and parallelises automatical...
Jonas Lätt, Bastien Chopard
AINA
2009
IEEE
15 years 4 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
HASE
2002
IEEE
15 years 4 months ago
The Concept and Practice of Software Quality Assurance in Japan in the Global Era
The Japanese computer industry in 1990s was hit with two major shocks at the same time. One shock was the drastic reform of computers and of network. The other shock was from the ...
Katsuyuki Yasuda, Shigeru Yamada