Sciweavers

1472 search results - page 26 / 295
» Technique Integration for Requirements Assessment
Sort
View
WETICE
2006
IEEE
14 years 1 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
PRESENCE
2008
185views more  PRESENCE 2008»
13 years 7 months ago
Pilot Evaluation Study of a Virtual Paracentesis Simulator for Skill Training and Assessment: The Beneficial Effect of Haptic Di
Effective, real-time training of health care professionals in invasive procedures is a challenging task. Furthermore, assessing in practice the acquisition of the dexterity and sk...
Costas S. Tzafestas, Kostas Birbas, Yiannis Koumpo...
INFSOF
2007
104views more  INFSOF 2007»
13 years 7 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
ENVSOFT
2007
109views more  ENVSOFT 2007»
13 years 7 months ago
The Automated Geospatial Watershed Assessment tool
A toolkit for distributed hydrologic modeling at multiple scales using two independent models within a geographic information system is presented. This open-source, freely availab...
Scott N. Miller, Darius J. Semmens, David C. Goodr...