Sciweavers

1051 search results - page 47 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
CSSE
2008
IEEE
14 years 3 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
CSMR
2000
IEEE
14 years 1 months ago
The Evolution Tree: A Maintenance-Oriented Software Development Model
In this paper we introduce the evolution tree - a software life-cycle model that describes software development as the continuous evolution of a software product. That is, we view...
Amir Tomer, Stephen R. Schach
METRICS
2003
IEEE
14 years 2 months ago
Estimating the Design Effort of Web Applications
Our study focuses on the effort needed for designing Web applications. The effort required for the design phase is an important part of the total development effort of a Web appli...
Luciano Baresi, Sandro Morasca, Paolo Paolini
ASWEC
2006
IEEE
14 years 2 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
WER
2007
Springer
14 years 2 months ago
Test-case Driven versus Checklist-based Inspections of Software Requirements - An Experimental Evaluation
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
Nina Dzamashvili-Fogelström, Tony Gorschek