Sciweavers

360 search results - page 52 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
149
Voted
ESEM
2010
ACM
15 years 4 months ago
A comprehensive characterization of NLP techniques for identifying equivalent requirements
Though very important in software engineering, linking artifacts of the same type (clone detection) or of different types (traceability recovery) is extremely tedious, error-prone...
Davide Falessi, Giovanni Cantone, Gerardo Canfora
131
Voted
SIGSOFT
2004
ACM
16 years 4 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
131
Voted
PROCOMET
1998
15 years 5 months ago
Extended static checking
Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces th...
K. Rustan M. Leino
POPL
2008
ACM
16 years 4 months ago
Semantics of transactional memory and automatic mutual exclusion
Software Transactional Memory (STM) is an attractive basis for the development of language features for concurrent programming. However, the semantics of these features can be del...
Andrew Birrell, Martín Abadi, Michael Isard...
EMSOFT
2010
Springer
15 years 1 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...