Sciweavers

3555 search results - page 616 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
15 years 2 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
ACSAC
2008
IEEE
15 years 8 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
AADEBUG
2005
Springer
15 years 7 months ago
Debugging object-oriented programs with behavior views
A complex software system may perform many program tasks during execution to provide the required functionalities. To detect and localize bugs related to the implementation of the...
Donglin Liang, Kai Xu 0002
ICSE
1999
IEEE-ACM
15 years 5 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
CARS
2001
15 years 2 months ago
Determination of optimal angiographic viewing angles for QCA
Important parameters in quantitative coronary angiography (QCA) are the severity and length of the lesion, the radius of the nonstenotic part of the affected vessel segment and th...
J. Christiaens, Rik Van de Walle, P. Gheeraert, Y....