Sciweavers

1412 search results - page 186 / 283
» The Value of Outsourced Software
Sort
View
TSE
2008
91views more  TSE 2008»
13 years 10 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
JCS
2002
115views more  JCS 2002»
13 years 9 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
RE
2008
Springer
13 years 9 months ago
Sensitivity analysis in the process of COTS mismatch-handling
Abstract During the selection of commercial off-theshelf (COTS) products, mismatches encountered between stakeholders' requirements and features offered by COTS products are i...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...
IAJIT
2010
162views more  IAJIT 2010»
13 years 8 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
ICFEM
2010
Springer
13 years 8 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...