Sciweavers

326 search results - page 37 / 66
» Tailoring and Verifying Software Process
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ISORC
2005
IEEE
14 years 2 months ago
Automated Model Checking and Testing for Composite Web Services
Web Services form a new distributed computing paradigm. Collaborative verification and validation are important when Web Services from different vendors are integrated together to...
Hai Huang, Wei-Tek Tsai, Raymond A. Paul, Yinong C...
ECBS
2003
IEEE
133views Hardware» more  ECBS 2003»
14 years 1 months ago
Enterprise-Wide Solutions Architecting Using UML
- In concert with customer and marketing staffs, systems engineers often formulate and codify an initial overall software system solution to fulfill customer needs. Without a focus...
Diane Feldman, Josephine Micallef, Dennis Mulcare
ESEC
1997
Springer
14 years 2 days ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
ICST
2008
IEEE
14 years 2 months ago
Model-Based Quality Assurance of Windows Protocol Documentation
Microsoft is producing high-quality documentation for Windows client-server and server-server protocols. Our group in the Windows organization is responsible for verifying the doc...
Wolfgang Grieskamp, Nicolas Kicillof, Dave MacDona...