Sciweavers

3555 search results - page 495 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICSM
2008
IEEE
15 years 12 months ago
Automated severity assessment of software defect reports
In mission critical systems, such as those developed by NASA, it is very important that the test engineers properly recognize the severity of each issue they identify during testi...
Tim Menzies, Andrian Marcus
AAAI
2006
15 years 6 months ago
Fast SAT-based Answer Set Solver
Recent research shows that SAT (propositional satisfiability) techniques can be employed to build efficient systems to compute answer sets for logic programs. ASSAT and CMODELS ar...
Zhijun Lin, Yuanlin Zhang, Hector Hernandez
HCI
2007
15 years 7 months ago
Closed-Loop Adaptive Decision Support Based on Automated Trust Assessment
This paper argues that it is important to study issues concerning trust and reliance when developing systems that are intended to augment cognition. Operators often under-rely on t...
Peter-Paul van Maanen, Tomas Klos, Kees van Dongen
COMPSAC
2009
IEEE
16 years 7 days ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
APSCC
2008
IEEE
15 years 12 months ago
Minimized Domain Knowledge for SOA-Based Interoperability
The variety and heterogeneity of legacy systems at the application level have contributed to the complexity of interoperability provision among different application domains. In t...
Azin Dehmoobad, Kamran Sartipi