Sciweavers

674 search results - page 71 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
Predictive Performance Modelling of Parallel Component Composition
Large-scale scientific computing applications frequently make use of closely-coupled distributed parallel components. The performance of such scientific applications is therefore ...
Lei Zhao, Stephen A. Jarvis, Daniel P. Spooner, Gr...
CLUSTER
2007
IEEE
13 years 10 months ago
Predictive performance modelling of parallel component compositions
Large-scale scientific computing applications frequently make use of closely-coupled distributed parallel components. The performance of such applications is therefore dependent o...
Lei Zhao, Stephen A. Jarvis
ISSTA
2006
ACM
14 years 4 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
FSTTCS
2003
Springer
14 years 3 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
FM
2003
Springer
104views Formal Methods» more  FM 2003»
14 years 3 months ago
Proving the Shalls
Incomplete, inaccurate, ambiguous, and volatile requirements have plagued the software industry since its inception. The convergence of model-based development and formal methods o...
Steven P. Miller, Alan C. Tribble, Mats Per Erik H...