Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
In this paper, we present a proposal for a UML profile called `Embedded UML'. Embedded UML represents a synthesis of various ideas in the real-time UML community, and concept...
Effective and efficient requirements negotiation is a key to the success of software development efforts. For large projects, this can be especially difficult to do effectively an...
Regression testing has been a popular quality assurance technique. Most regression testing techniques are based on code or software design. This paper proposes a scenario-based fu...
Raymond A. Paul, Lian Yu, Wei-Tek Tsai, Xiaoying B...
An applied research for the incremental evolution of a service oriented architecture for local eGovernment portals has been developed. Our reference eGovernment environment, curre...
Antonio Candiello, Andrea Albarelli, Agostino Cort...