Sciweavers

670 search results - page 45 / 134
» Software safety: relating software assurance and software in...
Sort
View
ISSTA
2000
ACM
14 years 2 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
WOSP
2005
ACM
14 years 3 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
METRICS
2002
IEEE
14 years 3 months ago
A Generic Model and Tool Support for Assessing and Improving Web Processes
Process assessment or process improvement is usually not considered in the context of Web applications, and the differences between Web applications and traditional applications a...
Daniel Rodríguez, Rachel Harrison, Manoranj...
SEFM
2005
IEEE
14 years 3 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
RE
2004
Springer
14 years 3 months ago
COTS Tenders and Integration Requirements
When buying COTS-based software, the customer has to choose between what is available. The supplier may add some minor parts, but rarely everything the customer wants. This means t...
Søren Lauesen