نتایج جستجو برای: traceability attack

تعداد نتایج: 86939  

2006
Yonggang Zhang René Witte Juergen Rilling Volker Haarslev

Traceability links provide support for software engineers in understanding the relations and dependencies among software artifacts created during the software development process. In this research, we focus on re-establishing traceability links between existing source code and documentation to support reverse engineering. We present a novel approach that addresses this issue by creating formal ...

2008
Andrea De Lucia Raffaele Landi Rocco Oliveto Genny Tortora

The potential benefits of traceability are well known, as well as the impracticability of maintaining traceability links manually. Recently, Information Retrieval (IR) techniques have been proposed in order to support the software engineer during the traceability link identification process. Clearly, a research method/tool has more change to be transferred to practitioner if its usefulness is i...

Journal: :Ann. Pure Appl. Logic 2008
Keng Meng Ng

In this paper we show that there is no minimal bound for jump traceability. In particular, there is no single order function such that strong jump traceability is equivalent to jump traceability for that order. The uniformity of the proof method allows us to adapt the technique to showing that the index set of the c.e. strongly jump traceables

2006
Jon Oldevik Tor Neple

Traceability has been held as an important factor in Model Driven Development. This paper takes a look at traceability related to model to text transformations. This is done through presenting scenarios and needs for such traceability and presenting a possible solution to the challenge. Examples of how the proposed solution works have been included using concrete examples of models and transfor...

2005
FRANK STEPHAN LIANG YU

We prove that lowness for weak genericity is equivalent to semicomputable traceability which is strictly between hyperimmune-freeness and computable traceability. We also show that semi-computable traceability implies lowness for weak randomness. These results refute a conjecture raised by several people.

2007
Marco Costa Alberto Rodrigues da Silva

Traceability in software engineering has been handled mostly has a documentation activity. This paper describes a reactive approach to traceability using MDD as general orientation and QVT as a transformation language. A conceptual model is presented defining some of the key concepts of a reactive traceability framework. Also the semantics of these key concepts is explained. Some examples are g...

2002
Marco Toranzo Jaelson Brelaz de Castro E. Mello

Many contributions concerned with software quality (DoD-2167A, ISO 9000-3 and Capability Maturity Model) mandate that requirements traceability be practiced. However, they do not provide a model of what information should be captures and used as a part of requirements traceability model. This paper provides an framework to improve the requirements traceability.

2013
Jiale Zhou Yue Lu Kristina Lundqvist

Automatically generating traceability links between software development artifacts existing throughout systems development life cycle, is becoming ever more important for requirements traceability. It remains an open software engineering challenge, especially for legacy systems, when the demand for minimizing human intervention is considered. The Vector Space Model (VSM), a notably known inform...

2009
Patrick Mäder Olly Gotel Ilka Philippow

Traceability is demanded within mature development processes and offers a wide range of advantages. Nevertheless, there are deterrents to establishing traceability: it can be painstaking to achieve initially and then subject to almost instantaneous decay. To be effective, this is clearly an investment that should be retained. We therefore focus on reducing the manual effort incurred in performi...

Journal: :IACR Cryptology ePrint Archive 2008
Dong Zheng Xiangxue Li Changshe Ma Kefei Chen Jianhua Li

Recently, democratic group signatures(DGSs) particularly catch our attention due to their great flexibilities, i.e., no group manager, anonymity, and individual traceability. In existing DGS schemes, individual traceability says that any member in the group can reveal the actual signer’s identity from a given signature. In this paper, we formally describe the definition of DGS, revisit its secu...

200420052006200720082009201020112012201320142015201620172018201920202021202220230200040006000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید