Sciweavers

3667 search results - page 521 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
107
Voted
AOSD
2004
ACM
15 years 9 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
115
Voted
SIGDOC
2004
ACM
15 years 9 months ago
Liability for defective content
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...
Cem Kaner
122
Voted
ADAEUROPE
2004
Springer
15 years 9 months ago
On the Tree Width of Ada Programs
The tree width of a graph G measures how close G is to being a tree or a series-parallel graph. Many well-known problems that are otherwise NP-complete can be solved efficiently if...
Bernd Burgstaller, Johann Blieberger, Bernhard Sch...
118
Voted
EDBTW
2004
Springer
15 years 9 months ago
Engineering Incentive Schemes for Ad Hoc Networks
In ad hoc networks, devices have to cooperate in order to compensate for the absence of infrastructure. Yet, autonomous devices tend to abstain from cooperation in order to save th...
Philipp Obreiter, Birgitta König-Ries, Georgi...
AGILEDC
2003
IEEE
15 years 9 months ago
Making Agile Development Work in a Government Contracting Environment - Measuring velocity with Earned Value
: Before any of the current “agile” development methods, Earned Value Management provided information for planning and controlling complex projects by measuring how much “val...
Glen B. Alleman, Michael Henderson, Ray Seggelke