Sciweavers

1412 search results - page 186 / 283
» The Value of Outsourced Software
Sort
View
TSE
2008
91views more  TSE 2008»
15 years 1 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
JCS
2002
115views more  JCS 2002»
15 years 1 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
RE
2008
Springer
15 years 1 months ago
Sensitivity analysis in the process of COTS mismatch-handling
Abstract During the selection of commercial off-theshelf (COTS) products, mismatches encountered between stakeholders' requirements and features offered by COTS products are i...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...
107
Voted
IAJIT
2010
162views more  IAJIT 2010»
15 years 3 days ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
ICFEM
2010
Springer
15 years 3 days ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...