Sciweavers

341 search results - page 45 / 69
» A Security Engineering Process based on Patterns
Sort
View
FASE
2006
Springer
15 years 6 months ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...
SACMAT
2010
ACM
15 years 7 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
JSS
2006
107views more  JSS 2006»
15 years 2 months ago
Measuring the usability of software components
The last decade marked the first real attempt to turn software development into engineering through the concepts of ComponentBased Software Development (CBSD) and Commercial Off-T...
Manuel F. Bertoa, José M. Troya, Antonio Va...
115
Voted
SCAM
2008
IEEE
15 years 8 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes
ASPDAC
2006
ACM
100views Hardware» more  ASPDAC 2006»
15 years 8 months ago
Generation of shorter sequences for high resolution error diagnosis using sequential SAT
Commonly used pattern sources in simulation-based verification include random, guided random, or design verification patterns. Although these patterns may help bring the design ...
Sung-Jui (Song-Ra) Pan, Kwang-Ting Cheng, John Moo...