Sciweavers

3514 search results - page 562 / 703
» Software Process Modeling: Principles of Entity Process Mode...
Sort
View
CISSE
2008
Springer
15 years 3 months ago
A New Methodology for Self Localization in Wireless Sensor Networks
Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the locat...
Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia R...
ESORICS
2010
Springer
15 years 3 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
JSW
2007
134views more  JSW 2007»
15 years 1 months ago
Compositional Patterns of Non-Functional Properties for Contract Negotiation
— Providing powerful and fine-grained capabilities for the analysis and management of non-functional properties is a major challenge for component-based software systems. This a...
Hervé Chang, Philippe Collet
ISSE
2010
15 years 11 days ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
ICSE
2012
IEEE-ACM
13 years 4 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang