Sciweavers

1559 search results - page 175 / 312
» Software needs engineering: a position paper
Sort
View
SAC
2010
ACM
14 years 5 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin
REFSQ
2009
Springer
14 years 4 months ago
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies
[Context and motivation] In market-driven product development of software intensive products large numbers of requirements threaten to overload the development organization. It is ...
Mahvish Khurum, Tony Gorschek, Lefteris Angelis, R...
ICSE
2008
IEEE-ACM
14 years 11 months ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...
ATAL
2008
Springer
14 years 2 days ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson