Sciweavers

1199 search results - page 5 / 240
» Software Verification and Software Engineering a Practitione...
Sort
View
ACSAC
1999
IEEE
15 years 6 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
WSC
1994
15 years 3 months ago
Inside simulation software: how it works and why it matters
ABSTRACT This paper provides beginning and intermediate simulation practitioners and interested simulation consumers with a grounding in how discrete-event simulation software work...
Thomas J. Schriber, Daniel T. Brunner
TASE
2008
IEEE
15 years 1 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
106
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han
106
Voted
ICSE
2001
IEEE-ACM
15 years 6 months ago
Improving Software Inspections by Using Reading Techniques
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
Forrest Shull, Ioana Rus, Victor R. Basili