Sciweavers

1042 search results - page 40 / 209
» Towards Requirements Engineering of Active Database Systems
Sort
View
158
Voted
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
174
Voted
CBSQ
2003
Springer
15 years 9 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
ICSE
2007
IEEE-ACM
16 years 4 months ago
Variability Management in Software Product Line Engineering
By explicitly modeling and managing variability, software product line engineering provides a systematic approach for creating a diversity of similar products at low cost, in shor...
Andreas Metzger, Klaus Pohl
CSEE
2001
Springer
15 years 8 months ago
YOOPEEDOO (UPEDU): A Process for Teaching Software Process
Process in software engineering is a growing concern for many software development organizations. The need for well-educated software engineers is bringing new software engineerin...
Pierre N. Robillard, Philippe Kruchten, Patrick d'...
RE
2010
Springer
15 years 2 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...