Sciweavers

3828 search results - page 693 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
FASE
2009
Springer
14 years 5 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
KBSE
2008
IEEE
14 years 4 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
KBSE
2008
IEEE
14 years 4 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
RE
2007
Springer
14 years 4 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...