Sciweavers

3555 search results - page 639 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FATES
2005
Springer
15 years 7 months ago
Model-Based Testing Through a GUI
Abstract. So far, model-based testing approaches have mostly been used in testing through various kinds of APIs. In practice, however, testing through a GUI is another equally impo...
Antti Kervinen, Mika Maunumaa, Tuula Pää...
ICSM
2003
IEEE
15 years 6 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
ICDCS
2002
IEEE
15 years 6 months ago
Design of Adaptive and Reliable Mobile Agent Communication Protocols
This paper presents a mailbox-based scheme for designing flexible and adaptive message delivery protocols in mobile agent (MA) systems. The scheme associates each mobile agent wit...
Jiannong Cao, Xinyu Feng, Jian Lü, Sajal K. D...
FINTAL
2006
15 years 5 months ago
Morphological Lexicon Extraction from Raw Text Data
The tool extract enables the automatic extraction of lemma-paradigm pairs from raw text data. The tool uses search patterns that consist of regular expressions and propositional lo...
Markus Forsberg, Harald Hammarström, Aarne Ra...
ICRE
2000
IEEE
15 years 5 months ago
A Lightweight Approach to Consistency of Scenarios and Class Models
Today, object-oriented requirements specifications typically combine a scenario (or use case) model and a class model for expressing functional requirements. With any such combina...
Martin Glinz