Sciweavers

488 search results - page 58 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
OOPSLA
2010
Springer
14 years 10 months ago
From OO to FPGA: fitting round objects into square hardware?
Consumer electronics today such as cell phones often have one or more low-power FPGAs to assist with energyintensive operations in order to reduce overall energy consumption and i...
Stephen Kou, Jens Palsberg
ICSE
2008
IEEE-ACM
16 years 19 days ago
Granularity in software product lines
Building software product lines (SPLs) with features is a challenging task. Many SPL implementations support features with coarse granularity ? e.g., the ability to add and wrap e...
Christian Kästner, Martin Kuhlemann, Sven Ape...
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 6 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
DSN
2008
IEEE
15 years 1 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 6 months ago
Business Process Simulation for Operational Decision Support
Contemporary business process simulation environments are geared towards design-time analysis, rather than operational decision support over already deployed and running processes....
Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Ar...