Sciweavers

264 search results - page 17 / 53
» Designing Software Ecosystems: How Can Modeling Techniques H...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 9 months ago
Modeling Business Media Platforms
The high speed at which new businesses are developed can to a large extent be attributed to their ability to flexibly combine existing services into an integrated business platfor...
Markus Greunz, Katarina Stanoevska-Slabeva
SERP
2003
15 years 5 months ago
Formal Validation of HCI User Tasks
— Our work focuses on the use of formal techniques in order to increase the quality of HCI software and of all the processes resulting from the development, verification, design...
Yamine Aït Ameur, Mickaël Baron, Patrick...
142
Voted
TSE
2002
157views more  TSE 2002»
15 years 3 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...
LCTRTS
2001
Springer
15 years 8 months ago
Designing an Efficient and Scalable Server-side Asynchrony Model for CORBA
When the Asynchronous Method Invocation (AMI) model was introduced into the CORBA specification, client applications benefited from the ability to invoke nonblocking two-way reque...
Darrell Brunsch, Carlos O'Ryan, Douglas C. Schmidt