Sciweavers

4923 search results - page 762 / 985
» Software Risk Management
Sort
View
REFSQ
2010
Springer
14 years 1 months ago
A Domain Ontology Building Process for Guiding Requirements Elicitation
[Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitati...
Inah Omoronyia, Guttorm Sindre, Tor Stålhane...
COMPSAC
2007
IEEE
14 years 1 months ago
AOP-based automated unit test classification of large benchmarks
Despite the availability of a variety of program analysis tools, evaluation of these tools is difficult, as only few benchmark suites exist. Existing benchmark suites lack the uni...
Cyrille Artho, Zhongwei Chen, Shinichi Honiden
COMPSAC
2007
IEEE
14 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ICESS
2007
Springer
14 years 1 months ago
An Analyzer of the User Event for Interactive DMB
Abstract. The interactive digital multimedia broadcasting stands for a convergence application between digital multimedia broadcasting service and wireless internet service. It dev...
Hlaing Su Khin, Sangwook Kim
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
14 years 1 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti