Sciweavers

439 search results - page 61 / 88
» Identification of Software Instabilities
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ICSEA
2006
IEEE
14 years 1 months ago
A Conceptual Framework for Business Process Engineering: A Case Study
— this paper discusses a conceptual framework for the requirements engineering process for e-school applications offering a service to the information society. The e-school appli...
Zeljka Car, Hrvoje Belani, Antun Caric
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
14 years 1 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
WILF
2005
Springer
86views Fuzzy Logic» more  WILF 2005»
14 years 1 months ago
Intelligent Track Analysis on Navy Platforms Using Soft Computing
We have developed and continue to enhance automated intelligent software that performs the tasks and decision making which now occurs by the personnel manning watch stations in the...
Robert Richards, Richard Stottler, Ben Ball, Cosku...
SEW
2003
IEEE
14 years 1 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...