Sciweavers

3792 search results - page 208 / 759
» Techniques for Trusted Software Engineering
Sort
View
COMPSAC
2005
IEEE
15 years 10 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
ISSTA
2004
ACM
15 years 9 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
KBSE
2003
IEEE
15 years 9 months ago
An Empirical Study on Groupware Support for Software Inspection Meetings
Software inspection is an effective way to assess product quality and to reduce the number of defects. In a software inspection the inspection meeting is a key activity to agree o...
Paul Grünbacher, Michael Halling, Stefan Biff...
ICSM
2000
IEEE
15 years 8 months ago
Evolution in Open Source Software: A Case Study
Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of se...
Michael W. Godfrey, Qiang Tu
SIGSOFT
1996
ACM
15 years 8 months ago
Model Checking Large Software Specifications
In this paper we present our experiences in using symbolic model checking to analyze a specification of a software system for aircraft collision avoidance. Symbolic model checking ...
Richard J. Anderson, Paul Beame, Steve Burns, Will...