Sciweavers

QSIC
2005
IEEE
14 years 1 months ago
Runtime Validation of Behavioural Contracts for Component Software
In component software, the independence of components is achieved by separating their interfaces from implementations. The interface definition of a component serves as the contr...
Yan Jin, Jun Han
QSIC
2005
IEEE
14 years 1 months ago
Test Case Generation by OCL Mutation and Constraint Solving
Fault-based testing is a technique where testers anticipate errors in a system under test in order to assess or generate test cases. The idea is to have enough test cases capable ...
Bernhard K. Aichernig, Percy Antonio Pari Salas
QSIC
2005
IEEE
14 years 1 months ago
A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies
Service workflow management which consolidates multiple services to achieve business goals has become a critical issue in service-oriented computing. Due to the unique feature of ...
Jun Yan, Yun Yang, Ryszard Kowalczyk, Xuan Thang N...
QSIC
2005
IEEE
14 years 1 months ago
Formal Fault Tree Analysis of State Transition Systems
Fault Tree Analysis (FTA) is a traditional deductive safety analysis technique that is applied during the system design stage. However, traditional FTA does not consider transitio...
Jianwen Xiang, Kazuhiro Ogata
METRICS
2005
IEEE
14 years 1 months ago
Teaching Evidence-Based Software Engineering to University Students
Evidence-based software engineering (EBSE) describes a process of identifying, understanding and evaluating findings from research and practice-based experience. This process aims...
Magne Jørgensen, Tore Dybå, Barbara A...
METRICS
2005
IEEE
14 years 1 months ago
Experiences from Conducting Semi-structured Interviews in Empirical Software Engineering Research
Many phenomena related to software development are qualitative in nature. Relevant measures of such phenomena are often collected using semi-structured interviews. Such interviews...
Siw Elisabeth Hove, Bente Anda
KBSE
2005
IEEE
14 years 1 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
KBSE
2005
IEEE
14 years 1 months ago
Prufrock: a framework for constructing polytypic theorem provers
Current formal software engineering methodologies provide a vast array of languages for specifying correctness properties, as well as a wide assortment automated tools that aid in...
Justin Ward, Garrin Kimmell, Perry Alexander
KBSE
2005
IEEE
14 years 1 months ago
Automating experimentation on distributed testbeds
Engineering distributed systems is a challenging activity. This is partly due to the intrinsic complexity of distributed systems, and partly due to the practical obstacles that de...
Yanyan Wang, Matthew J. Rutherford, Antonio Carzan...