Sciweavers

360 search results - page 52 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
ESEM
2010
ACM
13 years 8 months ago
A comprehensive characterization of NLP techniques for identifying equivalent requirements
Though very important in software engineering, linking artifacts of the same type (clone detection) or of different types (traceability recovery) is extremely tedious, error-prone...
Davide Falessi, Giovanni Cantone, Gerardo Canfora
SIGSOFT
2004
ACM
14 years 8 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
PROCOMET
1998
13 years 9 months ago
Extended static checking
Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces th...
K. Rustan M. Leino
POPL
2008
ACM
14 years 8 months ago
Semantics of transactional memory and automatic mutual exclusion
Software Transactional Memory (STM) is an attractive basis for the development of language features for concurrent programming. However, the semantics of these features can be del...
Andrew Birrell, Martín Abadi, Michael Isard...
EMSOFT
2010
Springer
13 years 6 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...