نتایج جستجو برای: traceability attack
تعداد نتایج: 86939 فیلتر نتایج به سال:
Traceability links provide support for software engineers in understanding the relations and dependencies among software artifacts created during the software development process. In this research, we focus on re-establishing traceability links between existing source code and documentation to support reverse engineering. We present a novel approach that addresses this issue by creating formal ...
The potential benefits of traceability are well known, as well as the impracticability of maintaining traceability links manually. Recently, Information Retrieval (IR) techniques have been proposed in order to support the software engineer during the traceability link identification process. Clearly, a research method/tool has more change to be transferred to practitioner if its usefulness is i...
In this paper we show that there is no minimal bound for jump traceability. In particular, there is no single order function such that strong jump traceability is equivalent to jump traceability for that order. The uniformity of the proof method allows us to adapt the technique to showing that the index set of the c.e. strongly jump traceables
Traceability has been held as an important factor in Model Driven Development. This paper takes a look at traceability related to model to text transformations. This is done through presenting scenarios and needs for such traceability and presenting a possible solution to the challenge. Examples of how the proposed solution works have been included using concrete examples of models and transfor...
We prove that lowness for weak genericity is equivalent to semicomputable traceability which is strictly between hyperimmune-freeness and computable traceability. We also show that semi-computable traceability implies lowness for weak randomness. These results refute a conjecture raised by several people.
Traceability in software engineering has been handled mostly has a documentation activity. This paper describes a reactive approach to traceability using MDD as general orientation and QVT as a transformation language. A conceptual model is presented defining some of the key concepts of a reactive traceability framework. Also the semantics of these key concepts is explained. Some examples are g...
Many contributions concerned with software quality (DoD-2167A, ISO 9000-3 and Capability Maturity Model) mandate that requirements traceability be practiced. However, they do not provide a model of what information should be captures and used as a part of requirements traceability model. This paper provides an framework to improve the requirements traceability.
Automatically generating traceability links between software development artifacts existing throughout systems development life cycle, is becoming ever more important for requirements traceability. It remains an open software engineering challenge, especially for legacy systems, when the demand for minimizing human intervention is considered. The Vector Space Model (VSM), a notably known inform...
Traceability is demanded within mature development processes and offers a wide range of advantages. Nevertheless, there are deterrents to establishing traceability: it can be painstaking to achieve initially and then subject to almost instantaneous decay. To be effective, this is clearly an investment that should be retained. We therefore focus on reducing the manual effort incurred in performi...
Recently, democratic group signatures(DGSs) particularly catch our attention due to their great flexibilities, i.e., no group manager, anonymity, and individual traceability. In existing DGS schemes, individual traceability says that any member in the group can reveal the actual signer’s identity from a given signature. In this paper, we formally describe the definition of DGS, revisit its secu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید