Sciweavers

3052 search results - page 351 / 611
» Engineers Don't Search
Sort
View
ESSOS
2009
Springer
14 years 5 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams
KBSE
2009
IEEE
14 years 5 months ago
Let the Ants Deploy Your Software - An ACO Based Deployment Optimisation Strategy
Abstract—Decisions regarding the mapping of software components to hardware nodes affect the quality of the resulting system. Making these decisions is hard when considering the ...
Aldeida Aleti, Lars Grunske, Indika Meedeniya, Ire...
ICFEM
2009
Springer
14 years 5 months ago
A Lazy Unbounded Model Checker for Event-B
Formal specification languages are traditionally supported by theorem provers, but recently model checkers have proven to be useful tools. In this paper we present Eboc, an explic...
Paulo J. Matos, Bernd Fischer, João P. Marq...
SCAM
2008
IEEE
14 years 5 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
COMPSAC
2007
IEEE
14 years 5 months ago
A Combined Concept Location Method for Java Programs
Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods f...
Dapeng Liu, Shaochun Xu