Sciweavers

2062 search results - page 255 / 413
» A Concern-Oriented Requirements Engineering Model
Sort
View
ICSE
2004
IEEE-ACM
16 years 4 months ago
Assume-Guarantee Verification of Source Code with Design-Level Assumptions
Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. To address the "state explosion" problem a...
Dimitra Giannakopoulou, Corina S. Pasareanu, Jamie...
VAMOS
2007
Springer
15 years 10 months ago
Variability Models Must Not be Invariant!
Variability modeling techniques are used to specify variable aspects of members of a family of related software artifacts. Instances of variability models are then used to effici...
Elmar Jürgens, Markus Pizka
ICNP
1999
IEEE
15 years 9 months ago
A Behavioral Model of Web Traffic
The growing importance of Web traffic on the Internet makes it important that we have accurate traffic models in order to plan and provision. In this paper we present a Web traffi...
Hyoung-Kee Choi, John O. Limb
APSEC
2009
IEEE
15 years 11 months ago
Assessing and Estimating Corrective, Enhancive, and Reductive Maintenance Tasks: A Controlled Experiment
— This paper describes a controlled experiment of student programmers performing maintenance tasks on a C++ program. The goal of the study is to assess the maintenance size, effo...
Vu Nguyen, Barry W. Boehm, Phongphan Danphitsanuph...
CISIS
2009
IEEE
15 years 11 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...