Sciweavers

COMPSAC
2007
IEEE
13 years 12 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
COMPSAC
2007
IEEE
13 years 12 months ago
AOP-based automated unit test classification of large benchmarks
Despite the availability of a variety of program analysis tools, evaluation of these tools is difficult, as only few benchmark suites exist. Existing benchmark suites lack the uni...
Cyrille Artho, Zhongwei Chen, Shinichi Honiden
COMPSAC
2007
IEEE
13 years 12 months ago
Piping Classification to Metamorphic Testing: An Empirical Study towards Better Effectiveness for the Identification of Failures
Mesh simplification is a mainstream technique to render graphics responsively in modern graphical software. However, the graphical nature of the output poses a test oracle problem...
W. K. Chan, Jeffrey C. F. Ho, T. H. Tse
COMPSAC
2007
IEEE
13 years 12 months ago
Test Automation in Practice
Rajesh Subramanyan
COMPSAC
2007
IEEE
13 years 12 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
COMPSAC
2007
IEEE
13 years 12 months ago
Unified Property Specification for Hardware/Software Co-Verification
Hardware/software co-verification is becoming an indispensable tool for building highly trustworthy embedded systems. A stumbling block to effective co-verification using model ch...
Fei Xie, Huaiyu Liu
COMPSAC
2007
IEEE
13 years 12 months ago
A metamodel for the notation of graphical modeling languages
Xiao He, Zhiyi Ma, Weizhong Shao, Ge Li
REFSQ
2010
Springer
13 years 12 months ago
A Domain Ontology Building Process for Guiding Requirements Elicitation
[Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitati...
Inah Omoronyia, Guttorm Sindre, Tor Stålhane...
REFSQ
2010
Springer
13 years 12 months ago
Binary Priority List for Prioritizing Software Requirements
Product managers in software companies are confronted with a continuous stream of incoming requirements. Due to limited resources they have to make a selection of those that can be...
Thomas Bebensee, Inge van de Weerd, Sjaak Brinkkem...
QOSA
2010
Springer
13 years 12 months ago
Validating Model-Driven Performance Predictions on Random Software Systems
Abstract. Software performance prediction methods are typically validated by taking an appropriate software system, performing both performance predictions and performance measurem...
Vlastimil Babka, Petr Tuma, Lubomír Bulej