Sciweavers

488 search results - page 76 / 98
» Using Model Checking to Generate Tests from Requirements Spe...
Sort
View
JOT
2006
75views more  JOT 2006»
15 years 3 months ago
Natures and Perspectives
"Nature" and "Perspective" have similar meaning for Eclipse developers and for personnel in a software product line organization. The nature of product line wo...
John D. McGregor
141
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
222
Voted
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
16 years 4 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
WSE
2002
IEEE
15 years 8 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
97
Voted
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
15 years 6 months ago
Enhanced Diameter Bounding via Structural
Bounded model checking (BMC) has gained widespread industrial use due to its relative scalability. Its exhaustiveness over all valid input vectors allows it to expose arbitrarily ...
Jason Baumgartner, Andreas Kuehlmann