Sciweavers

306 search results - page 40 / 62
» Tool Support for Reuse of Analysis Patterns - A Case Study
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
BMCBI
2006
143views more  BMCBI 2006»
13 years 8 months ago
IsoSVM - Distinguishing isoforms and paralogs on the protein level
Background: Recent progress in cDNA and EST sequencing is yielding a deluge of sequence data. Like database search results and proteome databases, this data gives rise to inferred...
Michael Spitzer, Stefan Lorkowski, Paul Cullen, Al...
JMLC
2000
Springer
14 years 1 days ago
Modularisation of Software Configuration Management
The principle of modularisation is one of the main techniques that software designers use to tame the complexity of programming. A software project, however, is complex in many oth...
Henrik Bærbak Christensen
SIGSOFT
2003
ACM
14 years 9 months ago
Leveraging field data for impact analysis and regression testing
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures, inferior performances, or user dissatisfaction. In previ...
Alessandro Orso, Taweesup Apiwattanapong, Mary Jea...
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
13 years 9 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi