Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Abstract-- A service-oriented system is a collection of independent services that interact with one another through message exchanges. Languages such as the Web Services Descriptio...
Johannes Maria Zaha, Marlon Dumas, Arthur H. M. te...
We present a novel technique for applying two-level runtime models to distributed systems. Our approach uses graph rewriting rules to transform a high-level source model into one o...
Christopher Wolfe, T. C. Nicholas Graham, W. Greg ...
In feature models’ construction, one basic task is to ensure the consistency of feature models, which often involves detecting and fixing of inconsistencies in feature models. S...
Bo Wang, Yingfei Xiong, Zhenjiang Hu, Haiyan Zhao,...
We present a new phrase-based conditional exponential family translation model for statistical machine translation. The model operates on a feature representation in which sentenc...