Sciweavers

3792 search results - page 26 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
AOSE
2000
Springer
14 years 2 months ago
Agent-Oriented Software Engineering: The State of the Art
Software engineers continually strive to develop tools and techniques to manage the complexity that is inherent in software systems. In this article, we argue that intelligent agen...
Michael Wooldridge, Paolo Ciancarini
COMPSAC
2003
IEEE
14 years 3 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
EUROMICRO
2006
IEEE
14 years 3 months ago
Visualization of Areas of Interest in Component-Based System Architectures
Understanding complex component-based systems often requires getting insight in how certain system properties, such as performance, trust, reliability, or structural attributes, c...
Heorhiy Byelas, Egor Bondarev, Alexandru Telea
WER
2005
Springer
14 years 3 months ago
A Content Analysis Technique for Inconsistency Detection in Software Requirements Documents
This paper presents J-RAn (Java Requirement Analyzer), a tool that implements a novel Content Analysis technique to support the verification of consistency and completeness of a So...
Alessandro Fantechi, Emilio Spinicci