Sciweavers

568 search results - page 15 / 114
» Enforcing traceability in software
Sort
View
CSMR
2007
IEEE
14 years 4 months ago
Monitoring Requirements Evolution using Views
This paper describes a research project concentrating on improving requirements management. We started this research by identifying the problems companies face with respect to req...
Marco Lormans
ECBS
2005
IEEE
162views Hardware» more  ECBS 2005»
14 years 3 months ago
Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness
Architecture modeling is practiced extensively in the software industry but there is little attention paid to the traceability, verifiability and completeness of architecture desi...
Antony Tang, Jun Han
OSDI
2006
ACM
14 years 10 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
SCP
2010
96views more  SCP 2010»
13 years 8 months ago
Enforcing structural regularities in software using IntensiVE
The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-call...
Johan Brichau, Andy Kellens, Sergio Castro, Theo D...
HOTOS
2003
IEEE
14 years 3 months ago
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection
Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of bot...
Emmett Witchel, Krste Asanovic