Sciweavers

377 search results - page 39 / 76
» A Case Study based Software Engineering Education using Open...
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IWPSE
2010
IEEE
13 years 5 months ago
Evolutional analysis of licenses in FOSS
FOSS (Free and Open Source System) is repeatedly modied and reused by other FOSS or proprietary software systems. They are released to others under specic licenses whose terms and...
Yuki Manabe, Yasuhiro Hayase, Katsuro Inoue
SEFM
2007
IEEE
14 years 2 months ago
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods
Various research prototypes and a well-founded theory of model based testing (MBT) suggests the application of MBT to real-world problems. In this article we report on applying th...
Bernhard K. Aichernig, Bernhard Peischl, Martin We...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 5 months ago
MT4j - A Cross-platform Multi-touch Development Framework
This article describes requirements and challenges of crossplatform multi-touch software engineering, and presents the open source framework Multi-Touch for Java (MT4j) as a solut...
Uwe Laufs, Christopher Ruff, Jan Zibuschka
RE
2008
Springer
13 years 6 months ago
Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
This paper proposes a two-step approach to identifying ambiguities in natural language (NL) requirements specifications (RSs). In the first step, a tool would apply a set of ambig...
Nadzeya Kiyavitskaya, Nicola Zeni, Luisa Mich, Dan...