Sciweavers

2513 search results - page 81 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
LICS
2006
IEEE
14 years 4 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
COMPSAC
2002
IEEE
14 years 3 months ago
The Method of Software Reliability Growth Models Choice Using Assumptions Matrix
The method of choice of the software reliability models based on the analysis of assumptions and compatibility both input and output parameters is offered. This method is illustra...
Vyacheslav S. Kharchenko, O. M. Tarasyuk, Vladimir...
WOSP
2000
ACM
14 years 2 months ago
A pattern-based approach to model software performance
In this paper we present a formal approach to analyse performance for distributed systems, which is integrated in the early stages of the software development process. We propose ...
José Merseguer, Javier Campos, Eduardo Mena
ICSM
2003
IEEE
14 years 3 months ago
On Modeling Software Architecture Recovery as Graph Matching
This paper presents a graph matching model for the software architecture recovery problem. Because of their expressiveness, the graphs have been widely used for representing both ...
Kamran Sartipi, Kostas Kontogiannis
ICSE
1997
IEEE-ACM
14 years 2 months ago
Endeavors: A Process System Infrastructure
As software projects evolve, possibly differing in size, complexity, scope, and purpose, the development processes that support the project must evolve to reflect these changes. T...
Arthur S. Hitomi, Gregory Alan Bolcer, Richard N. ...