Sciweavers

674 search results - page 80 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
OOPSLA
2005
Springer
14 years 3 months ago
Model-driven software product lines
iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
OOPSLA
2005
Springer
14 years 3 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
ICSE
1999
IEEE-ACM
14 years 2 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
DATE
2003
IEEE
122views Hardware» more  DATE 2003»
14 years 3 months ago
A General Framework for Analysing System Properties in Platform-Based Embedded System Designs
We present a framework (Real-Time Calculus) for analysing various system properties pertaining to timing analysis, loads on various components and on-chip buffer memory requiremen...
Samarjit Chakraborty, Simon Künzli, Lothar Th...
CAV
2005
Springer
122views Hardware» more  CAV 2005»
14 years 3 months ago
Interpolant-Based Transition Relation Approximation
Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, sof...
Ranjit Jhala, Kenneth L. McMillan