Sciweavers

3514 search results - page 120 / 703
» Evolving Specification Engineering
Sort
View
SIGSOFT
2007
ACM
16 years 4 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
157
Voted
SIGSOFT
2001
ACM
16 years 4 months ago
Detecting implied scenarios in message sequence chart specifications
Scenario-based specifications such as Message Sequence Charts (MSCs) are becoming increasingly popular as part of a requirements specification. Scenarios describe how system compo...
Jeff Kramer, Jeff Magee, Sebastián Uchitel
112
Voted
APSEC
2008
IEEE
15 years 10 months ago
Management of Composites in Software Engineering Environments
Design and development scalability, in any engineering, requires information hiding and a specific composition mechanism in which composite items are made-up of other items. This ...
Jacky Estublier, Germán Vega, Thomas Levequ...
182
Voted
ICCS
2007
Springer
15 years 7 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
118
Voted
CSEE
2000
Springer
15 years 7 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...