Sciweavers

3792 search results - page 156 / 759
» Techniques for Trusted Software Engineering
Sort
View
COMPSAC
2006
IEEE
15 years 10 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
ICSEA
2006
IEEE
15 years 10 months ago
Template-Based Development of Fault-Tolerant Embedded Software
— Currently there are different approaches to develop fault-tolerant embedded software: implementing the system from scratch or using libraries respectively specialized hardware....
Christian Buckl, Alois Knoll, Gerhard Schrott
COMPSAC
2005
IEEE
15 years 9 months ago
Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures
The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...
IWPC
2005
IEEE
15 years 9 months ago
Detecting and Visualizing Refactorings from Software Archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Carsten Görg, Peter Weißgerber
COMPSAC
2002
IEEE
15 years 9 months ago
Application of Hazard Analysis to Software Quality Modelling
Quality is a fundamental concept in software and information system development. It is also a complex and elusive concept. A large number of quality models have been developed for...
Hong Zhu, Yanlong Zhang, Qingning Huo, Sue Greenwo...