Sciweavers

927 search results - page 105 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
RTCSA
2008
IEEE
14 years 2 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
FASE
2005
Springer
14 years 1 months ago
Non-local Choice and Beyond: Intricacies of MSC Choice Nodes
MSC is a visual formalism for specifying the behavior of systems. To obtain implementations for individual processes, the MSC choice construction poses fundamental problems. The be...
Arjan J. Mooij, Nicolae Goga, Judi Romijn
COMPSAC
2002
IEEE
14 years 21 days ago
A Structured Approach to Handling On-Line Interface Upgrades
The Integration of complex systems out of existing systems is an active area of research and development. There are many practical situations in which the interfaces of the compon...
Cliff B. Jones, Alexander B. Romanovsky, Ian Welch
PROFES
2001
Springer
14 years 5 days ago
Requirements Evolution from Process to Product Oriented Management
Requirements Evolution represents one of the major problems in developing computer-based systems. Current practice in Requirement Engineering relies on process-oriented methodologi...
Stuart Anderson, Massimo Felici