Sciweavers

826 search results - page 105 / 166
» Software Reuse: Research and Practice
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 10 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
108
Voted
ICRE
2000
IEEE
15 years 5 months ago
Requirements Documentation: Why a Formal Basis is Essential
Unless you have a complete and precise description of your product’s requirements, it is very unlikely that you will satisfy those requirements. A requirements document that is ...
David Lorge Parnas
RE
2007
Springer
15 years 6 months ago
Requirements in the wild: How small companies do it
Small companies form a large part of the software industry, but have mostly been overlooked by the requirements engineering research community. We know very little about the techn...
Jorge Aranda, Steve M. Easterbrook, Greg Wilson
97
Voted
WCRE
2002
IEEE
15 years 5 months ago
A Study on the Current State of the Art in Tool-Supported UML-Based Static Reverse Engineering
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE tools support ...
Ralf Kollman, Petri Selonen, Eleni Stroulia, Tarja...
92
Voted
EDBTW
2010
Springer
15 years 7 months ago
Biochemical network matching and composition
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
Martin Hugh Goodfellow, John Wilson, Ela Hunt