Sciweavers

419 search results - page 36 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
SCS
2001
13 years 10 months ago
Software Safety: Where's the Evidence?
Standards for safety critical software usually either mandate or recommend development and assessment techniques which are deemed appropriate to reduce the risk of flaws in the so...
John A. McDermid
COMPSAC
2010
IEEE
13 years 6 months ago
An Analysis of Tool-Based Research in Software Engineering
Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts,...
Jonas Helming, Maximilian Koegel, Hoda Naguib, Mir...
KBSE
2010
IEEE
13 years 6 months ago
An experience report on scaling tools for mining software repositories using MapReduce
The need for automated software engineering tools and techniques continues to grow as the size and complexity of studied systems and analysis techniques increase. Software enginee...
Weiyi Shang, Bram Adams, Ahmed E. Hassan
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 3 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
ITCC
2005
IEEE
14 years 2 months ago
Using Formal Concept Analysis to Establish Model Dependencies
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...
Igor Ivkovic, Kostas Kontogiannis