Sciweavers

2935 search results - page 518 / 587
» An Integrated Approach to High Integrity Software Verificati...
Sort
View
LAWEB
2009
IEEE
15 years 11 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
ICICS
2009
Springer
15 years 11 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
MODELS
2009
Springer
15 years 11 months ago
Catch Me If You Can - Debugging Support for Model Transformations
Abstract. Model-Driven Engineering places models as first-class artifacts throughout the software lifecycle requiring the availability of proper transformation languages. Although...
Johannes Schönböck, Gerti Kappel, Angeli...
125
Voted
GROUP
2009
ACM
15 years 11 months ago
Cluestr: mobile social networking for enhanced group communication
Recent technological advances foster the spreading of social software in the mobile domain. Hence, future usage patterns of mobile devices will involve more group interaction. Whi...
Reto Grob, Michael Kuhn 0002, Roger Wattenhofer, M...
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
15 years 11 months ago
A Mutation Model for the SystemC TLM 2.0 Communication Interfaces
Mutation analysis is a widely-adopted strategy in software testing with two main purposes: measuring the quality of test suites, and identifying redundant code in programs. Simila...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli