Sciweavers

5506 search results - page 678 / 1102
» Visualizing Software Changes
Sort
View
FCCM
2008
IEEE
205views VLSI» more  FCCM 2008»
15 years 11 months ago
Credit Risk Modelling using Hardware Accelerated Monte-Carlo Simulation
The recent turmoil in global credit markets has demonstrated the need for advanced modelling of credit risk, which can take into account the effects of changing economic condition...
David B. Thomas, Wayne Luk
ICST
2008
IEEE
15 years 11 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
HASE
2007
IEEE
15 years 11 months ago
On the Verifiability of Programs Written in the Feature Language Extensions
High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Wu-Hon F. Leung
159
Voted
ICSEA
2006
IEEE
15 years 11 months ago
A Conceptual Framework for Business Process Engineering: A Case Study
— this paper discusses a conceptual framework for the requirements engineering process for e-school applications offering a service to the information society. The e-school appli...
Zeljka Car, Hrvoje Belani, Antun Caric
WCRE
2006
IEEE
15 years 11 months ago
"Cloning Considered Harmful" Considered Harmful
Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplic...
Cory Kapser, Michael W. Godfrey