Sciweavers

3667 search results - page 273 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
ITNG
2008
IEEE
15 years 11 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
ICSM
2006
IEEE
15 years 10 months ago
Exploiting the Analogy Between Traces and Signal Processing
The main challenge of dynamic analysis is the huge volume of data, making it difficult to extract high level views. Most techniques developed so far adopt a finegrained approach ...
Adrian Kuhn, Orla Greevy
RE
2005
Springer
15 years 10 months ago
Personal and Contextual Requirements Engineering
A framework for requirements analysis is proposed that accounts for individual and personal goals, and the effect of time and context on personal requirements. The implications of...
Alistair G. Sutcliffe, Stephen Fickas, McKay Moore...
PST
2004
15 years 6 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
CC
2007
Springer
118views System Software» more  CC 2007»
15 years 11 months ago
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries
We present a unification-based, context-sensitive escape and effect analysis that infers lightweight method summaries describing heap effects. The analysis is parameterized on two...
Sigmund Cherem, Radu Rugina