Sciweavers

1815 search results - page 152 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
ECAI
2008
Springer
15 years 5 months ago
Can URML Model Successfully Drools Rules?
The use of rules in business modeling is becoming more and more important, in applications requiring dynamic change of behavior. A number of rule languages and tools have been prop...
Emilian Pascalau, Adrian Giurca
ESEC
1995
Springer
15 years 7 months ago
Improvise: Interactive Multimedia Process Visualization Environment
Improvise is a multimedia system for modeling, visualizing and documenting software and business processes. It runs under Microsoft Windows and on most avors of the UNIX operating ...
Naser S. Barghouti, Eleftherios Koutsofios, Edith ...
INFSOF
2007
83views more  INFSOF 2007»
15 years 3 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
DICS
2006
15 years 5 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
124
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard