Sciweavers

1412 search results - page 94 / 283
» The Value of Outsourced Software
Sort
View
ICSE
2009
IEEE-ACM
13 years 6 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
SIGSOFT
2006
ACM
14 years 9 months ago
Lightweight extraction of syntactic specifications
A method for extracting syntactic specifications from heapmanipulating code is described. The state of the heap is represented as an environment mapping each variable or field to ...
Mana Taghdiri, Robert Seater, Daniel Jackson
ADAEUROPE
2010
Springer
13 years 7 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
ICSE
2011
IEEE-ACM
13 years 10 days ago
ReAssert: a tool for repairing broken unit tests
Successful software systems continuously change their requirements and thus code. When this happens, some existing tests get broken because they no longer reflect the intended be...
Brett Daniel, Danny Dig, Tihomir Gvero, Vilas Jaga...
AGILEDC
2007
IEEE
14 years 3 months ago
Forming to Performing: The Evolution of an Agile Team
Using Bruce Tuckman’s [1] “Forming – Storming – Norming – Performing” model of team development we review the effects of change on our team through each stage. We go o...
Darren Rowley, Manfred Lange