Sciweavers

1199 search results - page 130 / 240
» Software Verification and Software Engineering a Practitione...
Sort
View
162
Voted
ICFEM
1997
Springer
15 years 8 months ago
Formally Specifying and Verifying Real-Time Systems
A real-time computer system is a system that must perform its functions within specified time bounds. These systems are generally characterized by complex interactions with the en...
Richard A. Kemmerer
PPPJ
2006
ACM
15 years 10 months ago
Propagation of JML non-null annotations in Java programs
Development of high quality code is extremely dicult. Tools that help maintaining the proper quality of code produced by programmers can be very useful: they may increase the qua...
Maciej Cielecki, Jedrzej Fulara, Krzysztof Jakubcz...
NSPW
2004
ACM
15 years 10 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
ESEM
2008
ACM
15 years 6 months ago
A constrained regression technique for cocomo calibration
Building cost estimation models is often considered a search problem in which the solver should return an optimal solution satisfying an objective function. This solution also nee...
Vu Nguyen, Bert Steece, Barry W. Boehm
SIGSOFT
2005
ACM
16 years 5 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde