Sciweavers

KBSE
2007
IEEE
14 years 6 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
KBSE
2007
IEEE
14 years 6 months ago
Tool support for the compile-time execution structure of object-oriented programs with ownership annotations
Ownership domain annotations enable obtaining at compiletime the system’s execution structure from the annotated program. The execution structure is sound, hierarchical (and thu...
Marwan Abi-Antoun, Jonathan Aldrich
KBSE
2007
IEEE
14 years 6 months ago
Efficiently monitoring data-flow test coverage
Raúl A. Santelices, Mary Jean Harrold
KBSE
2007
IEEE
14 years 6 months ago
Iterative model-driven development of adaptable service-based applications
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...
KBSE
2007
IEEE
14 years 6 months ago
Using information retrieval to support design of incremental change of software
The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
Denys Poshyvanyk, Andrian Marcus
KBSE
2007
IEEE
14 years 6 months ago
Covering array sampling of input event sequences for automated gui testing
This paper describes a new automated technique to generate test cases for GUIs by using covering arrays (CAs). The key motivation is to generate long GUI event sequences that are ...
Xun Yuan, Myra B. Cohen, Atif M. Memon
KBSE
2007
IEEE
14 years 6 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
KBSE
2007
IEEE
14 years 6 months ago
Towards supporting awareness of indirect conflicts across software configuration management workspaces
Workspace awareness techniques have been proposed to enhance the effectiveness of software configuration management systems in coordinating parallel work. These techniques share i...
Anita Sarma, Gerald Bortis, André van der H...
KBSE
2007
IEEE
14 years 6 months ago
Unit testing concurrent software
There are many difficulties associated with developing correct multithreaded software, and many of the activities that are simple for single threaded software are exceptionally ha...
William Pugh, Nathaniel Ayewah
KBSE
2007
IEEE
14 years 6 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller