Sciweavers

1308 search results - page 184 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
CACM
2007
164views more  CACM 2007»
15 years 4 months ago
Is abstraction the key to computing?
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
Jeff Kramer
ICSE
2005
IEEE-ACM
16 years 4 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
SAC
2003
ACM
15 years 9 months ago
Designing and Specifying Mobility within the Multiagent Systems Engineering Methodology
Recently, researchers have created many platforms and applications for mobile agents; however, current Agent-Oriented Software Engineering (AOSE) methodologies have yet not fully ...
Athie L. Self, Scott A. DeLoach
AADEBUG
2000
Springer
15 years 8 months ago
Value Withdrawal Explanation in CSP
This work is devoted to constraint solving motivated by the debugging of constraint logic programs a la GNU-Prolog. The paper focuses only on the constraints. In this framework, c...
Gérard Ferrand, Willy Lesaint, Alexandre Te...
GLOBAL
2003
Springer
15 years 9 months ago
Performance Evaluation for Global Computation
Abstract. Global computing applications co-ordinate distributed computations across widely-dispersed hosts. Such systems present formidable design and implementation challenges to ...
Linda Brodo, Pierpaolo Degano, Stephen Gilmore, Ja...