[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Interactive Fault Localization Techniques in a Spreadsheet Environment

End-user programmers develop more software than any other group of programmers, using software authoring devices such as multimedia simulation builders, e-mail filtering editors, by-demonstration macro builders, and spreadsheet environments. Despite ...

research-article
On the Value of Static Analysis for Fault Detection in Software

No single software fault-detection technique is capable of addressing all fault-detection concerns. Similarly to software reviews and testing, static analysis tools (or automated static analysis) can be used to remove defects prior to release of a ...

research-article
Task Construction for Model-Based Design of Embedded Control Software

Constructing runtime tasks, or operating system-level processes/threads, from the components of software design models is crucial to the model-based development of embedded control software. A better method should explore more design choices and reduce ...

research-article
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets

Design-level vulnerabilities are a major source of security risks in software. To improve trustworthiness of software design, this paper presents a formal threat-driven approach, which explores explicit behaviors of security threats as the mediator ...

research-article
Comments on 'Automatic Analysis of Consistency between Requirements and Designs'

This article comments on "automatic analysis of consistency between requirements and designs".

Comments

Please enable JavaScript to view thecomments powered by Disqus.