Sciweavers

1938 search results - page 177 / 388
» Dependable Software
Sort
View
VMCAI
2009
Springer
15 years 9 months ago
LTL Generalized Model Checking Revisited
Given a 3-valued abstraction of a program (possibly generated using rogram analysis and predicate abstraction) and a temporal logic formula, generalized model checking (GMC) checks...
Patrice Godefroid, Nir Piterman
RE
2009
Springer
15 years 9 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
SLE
2009
Springer
15 years 9 months ago
Study of an API Migration for Two XML APIs
Abstract. API migration refers to adapting an application such that its dependence on a given API (the source API) is eliminated in favor of depending on an alternative API (the ta...
Thiago Tonelli Bartolomei, Krzysztof Czarnecki, Ra...
CSMR
2006
IEEE
15 years 8 months ago
Using Version Information in Architectural Clustering - A Case Study
This paper describes a case study that uses clustering to group classes of an existing objectoriented system of significant size into subsystems. The clustering process is based o...
Andreas Wierda, Eric Dortmans, Lou J. Somers
WCRE
2006
IEEE
15 years 8 months ago
An Analysis of the Correctness and Completeness of Aspect Weaving
Jointly deployed aspects may interact with each other. While some interactions might be intended, unintended interactions (interferences) can break a program. Detecting and resolv...
Günter Kniesel, Uwe Bardey