Sciweavers

670 search results - page 78 / 134
» Software safety: relating software assurance and software in...
Sort
View
BPM
2003
Springer
121views Business» more  BPM 2003»
14 years 3 months ago
Towards a Library for Process Programming
Process programming is regarded as a critical approach in many cooperative process related areas including software engineering, workflow management, business process management, e...
Guangxin Yang
DC
2010
13 years 10 months ago
Model checking transactional memories
Model checking software transactional memories (STMs) is difficult because of the unbounded number, length, and delay of concurrent transactions and the unbounded size of the memo...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
MOBISYS
2008
ACM
14 years 9 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
ICSM
2006
IEEE
14 years 4 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi
FASE
2005
Springer
14 years 3 months ago
Ensuring Structural Constraints in Graph-Based Models with Type Inheritance
Graphs are a common means to represent structures in models and meta-models of software systems. In this context, the description of model domains by classifying the domain entitie...
Gabriele Taentzer, Arend Rensink