Sciweavers

1156 search results - page 38 / 232
» The PENG System: Practice and Experience
Sort
View
PPPJ
2006
ACM
15 years 5 months ago
Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java developmen
The development of a tool for reconstructing UML sequence diagrams from executing Java programs is a challenging task. We implemented such a tool designed to analyze any kind of J...
Matthias Merdes, Dirk Dorsch
70
Voted
CCS
2004
ACM
15 years 4 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ASE
2008
120views more  ASE 2008»
14 years 11 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
IWC
2006
82views more  IWC 2006»
14 years 11 months ago
Usability professionals - current practices and future development
The usability concept has now received such a wide recognition in information technology (IT) development that working with usability can be regarded as a profession in its own ri...
Jan Gulliksen, Inger Boivie, Bengt Göransson
ECOOP
2009
Springer
15 years 11 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich