Sciweavers

3667 search results - page 252 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
122
Voted
RE
2009
Springer
15 years 11 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
APSEC
2008
IEEE
15 years 11 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
177
Voted
CSSE
2008
IEEE
15 years 11 months ago
Image Segmentation Based on 2D Otsu Method with Histogram Analysis
—Image segmentation plays an important role in image analysis and computer vision system. Among all segmentation techniques, the automatic thresholding methods are widely used be...
Jun Zhang, Jinglu Hu
KBSE
2008
IEEE
15 years 11 months ago
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis
Identifying code implementing a crosscutting concern (CCC) automatically can benefit the maintainability and evolvability of the application. Although many approaches have been p...
Danfeng Zhang, Yao Guo, Xiangqun Chen
COMPSAC
2007
IEEE
15 years 11 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...