Sciweavers

2433 search results - page 11 / 487
» Power laws in software
Sort
View
ENTCS
2008
125views more  ENTCS 2008»
13 years 8 months ago
Can Refinement be Automated?
We automatically verify Back's atomicity refinement law and a classical data refinement law for action systems. Our novel approach mechanises a refinement calculus based on K...
Peter Höfner, Georg Struth
ER
2009
Springer
130views Database» more  ER 2009»
14 years 3 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
ATAL
2008
Springer
13 years 10 months ago
The conclusion of contracts by software agents in the eyes of the law
Faced with the ongoing evolution of software agents from mere passive tools to e-tailers acting autonomously for their human owners (principals), new legal challenges appear on th...
Tina Balke, Torsten Eymann
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
METRICS
1997
IEEE
14 years 18 days ago
Metrics and Laws of Software Evolution - The Nineties View
The process of E-type software development andevolution has proven most difficult to improve, possibly due to the fact that the processis a multi-input, multi-output system involv...
Meir M. Lehman, Juan F. Ramil, Paul Wernick, Deway...