Sciweavers

198 search results - page 20 / 40
» Software Process Improvement: The Competisoft Project
Sort
View
ESEM
2010
ACM
13 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ITNG
2010
IEEE
14 years 2 months ago
BAUT: A Bayesian Driven Tutoring System
—This paper presents the design of BAUT, a tutoring system that explores statistical approach for providing instant project failure analysis. Driven by a Bayesian Network (BN) in...
Song Tan, Kai Qian, Xiang Fu, Prabir Bhattacharya
RE
2005
Springer
14 years 3 months ago
Model-Driven Visual Requirements Engineering
This paper describes the requirements handling process of a set of research projects, the ATHENA IP, and how this process is supported by modeling and visualizing requirement stru...
Helge Grenager Solheim, Frank M. Lillehagen, Sobah...
KBSE
2002
IEEE
14 years 2 months ago
Model-Based Tests of Truisms
Software engineering (SE) truisms capture broadlyapplicable principles of software construction. The trouble with truisms is that such general principles may not apply in specifi...
Tim Menzies, David Raffo, Siri-on Setamanit, Ying ...
EUROMICRO
2005
IEEE
14 years 3 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca