Sciweavers

3792 search results - page 48 / 759
» Techniques for Trusted Software Engineering
Sort
View
RE
2002
Springer
13 years 9 months ago
Rationale-Based Use Case Specification
Abstract. Few requirements engineering techniques are widely applied in industry. This can
Allen H. Dutoit, Barbara Paech
CCE
2010
13 years 7 months ago
Scope for the application of mathematical programming techniques in the synthesis and planning of sustainable processes
Sustainability has recently emerged as a key issue in process systems engineering (PSE). Mathematical programming techniques offer a general modeling framework for including enviro...
Ignacio E. Grossmann, Gonzalo Guillén-Gos&a...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 6 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
IWPC
2008
IEEE
14 years 4 months ago
Scenario-Based Comparison of Clone Detection Techniques
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available c...
Chanchal Kumar Roy, James R. Cordy
APSEC
2000
IEEE
14 years 2 months ago
A comparative evaluation of techniques for syntactic level source code analysis
Many program maintenance tools rely on traditional parsing techniques to obtain syntactic level models of the code being maintained. When, for some reason, code cannot be parsed, ...
Anthony Cox, Charles L. A. Clarke