Sciweavers

439 search results - page 61 / 88
» Identification of Software Instabilities
Sort
View
109
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
130
Voted
ICSEA
2006
IEEE
15 years 8 months ago
A Conceptual Framework for Business Process Engineering: A Case Study
— this paper discusses a conceptual framework for the requirements engineering process for e-school applications offering a service to the information society. The e-school appli...
Zeljka Car, Hrvoje Belani, Antun Caric
121
Voted
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 8 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
124
Voted
WILF
2005
Springer
86views Fuzzy Logic» more  WILF 2005»
15 years 8 months ago
Intelligent Track Analysis on Navy Platforms Using Soft Computing
We have developed and continue to enhance automated intelligent software that performs the tasks and decision making which now occurs by the personnel manning watch stations in the...
Robert Richards, Richard Stottler, Ben Ball, Cosku...
137
Voted
SEW
2003
IEEE
15 years 8 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...