Sciweavers

3555 search results - page 234 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SCS
2004
15 years 6 months ago
Contract-Based Justification for COTS Component within Safety Critical Applications
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure tha...
Fan Ye, Tim Kelly
ICSM
2009
IEEE
15 years 11 months ago
On the use of relevance feedback in IR-based concept location
Concept location is a critical activity during software evolution as it produces the location where a change is to start in response to a modification request, such as, a bug repo...
Gregory Gay, Sonia Haiduc, Andrian Marcus, Tim Men...
VLDB
1993
ACM
112views Database» more  VLDB 1993»
15 years 9 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
165
Voted
ICUMT
2009
15 years 2 months ago
Cooperative robust sequential detection algorithms for Spectrum Sensing in Cognitive Radio
Abstract-- We consider the problem of Spectrum Sensing in Cognitive Radio Networks. In our previous work we have developed DualCUSUM, a distributed algorithm for change detection a...
ArunKumar Jayaprakasam, Vinod Sharma
TSE
2011
107views more  TSE 2011»
15 years 44 min ago
Deriving a Slicing Algorithm via FermaT Transformations
In this paper we present a case study in deriving an algorithm from a formal specification via FermaT transformations. The general method (which is presented in a separate paper)...
Martin P. Ward, Hussein Zedan