Sciweavers

1154 search results - page 161 / 231
» Case Study: Software Product Integration Practices
Sort
View
119
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 9 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
111
Voted
FASE
2005
Springer
15 years 9 months ago
Non-local Choice and Beyond: Intricacies of MSC Choice Nodes
MSC is a visual formalism for specifying the behavior of systems. To obtain implementations for individual processes, the MSC choice construction poses fundamental problems. The be...
Arjan J. Mooij, Nicolae Goga, Judi Romijn
126
Voted
AINA
2006
IEEE
15 years 7 months ago
Supporting Runtime Reconfiguration on Network Processors
Network Processors (NPs) are set to play a key role in the next generation of networking technology. They have the performance of ASIC-based routers whilst offering a high degree o...
Kevin Lee, Geoffrey Coulson
131
Voted
SAC
2003
ACM
15 years 8 months ago
An Initial Investigation of Test Driven Development in Industry
Test Driven Development (TDD) is a software development practice in which unit test cases are incrementally written prior to code implementation. In our research, we ran a set of ...
Boby George, Laurie A. Williams
102
Voted
SIGSOFT
2009
ACM
16 years 4 months ago
Learning from examples to improve code completion systems
The suggestions made by current IDE's code completion features are based exclusively on static type system of the programming language. As a result, often proposals are made ...
Marcel Bruch, Martin Monperrus, Mira Mezini