Sciweavers

2236 search results - page 65 / 448
» Secure Software Design in Practice
Sort
View
139
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
CBSE
2004
Springer
15 years 8 months ago
CB-SPE Tool: Putting Component-Based Performance Engineering into Practice
A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under development will satisfy its Quality of Service requireme...
Antonia Bertolino, Raffaela Mirandola
97
Voted
AGENTS
2001
Springer
15 years 7 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
116
Voted
ACMDIS
2006
ACM
15 years 8 months ago
What do usability evaluators do in practice?: an explorative study of think-aloud testing
Think-aloud testing is a widely employed usability evaluation method, yet its use in practice is rarely studied. We report an explorative study of 14 think-aloud sessions, the aud...
Mie Nørgaard, Kasper Hornbæk
ICRE
1998
IEEE
15 years 6 months ago
Viewpoints for Requirements Elicitation: A Practical Approach
This paper introduces an approach to multi-perspective requirements engineering (PREview) which has been designed for industrial use and discusses our practical experience in appl...
Ian Sommerville, Peter Sawyer, Stephen Viller