Sciweavers

439 search results - page 33 / 88
» Identification of Software Instabilities
Sort
View
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
IWPC
1998
IEEE
14 years 1 days ago
Pattern Visualization for Software Comprehension
Cognitive science emphasizes the strength of visual formalisms for human learning and problem solving. In software engineering, a clear, visual presentation of a system's arc...
Reinhard Schauer, Rudolf K. Keller
ICSE
2004
IEEE-ACM
14 years 7 months ago
Imposing a Memory Management Discipline on Software Deployment
The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incompl...
Eelco Dolstra, Eelco Visser, Merijn de Jonge
AOSD
2007
ACM
13 years 11 months ago
C-CLR: a tool for navigating highly configurable system software
In order to accommodate the spectrum of configuration options currently required for competitive system infrastructures, many systems leverage heavy usage of C preprocessor contro...
Nieraj Singh, Celina Gibbs, Yvonne Coady
WCRE
1996
IEEE
13 years 12 months ago
Finding Reusable Software Components in Large Systems
The extraction of reusable software components from existing systems is an attractive idea. The goal of the work in this paper is not to extract a component automatically, but to ...
James M. Neighbors