Sciweavers

146 search results - page 24 / 30
» A Systematic Method to Identify Software Components
Sort
View
EMSOFT
2008
Springer
13 years 9 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...
BMCBI
2007
173views more  BMCBI 2007»
13 years 8 months ago
Ringo - an R/Bioconductor package for analyzing ChIP-chip readouts
Background: Chromatin immunoprecipitation combined with DNA microarrays (ChIP-chip) is a high-throughput assay for DNA-protein-binding or post-translational chromatin/histone modi...
Joern Toedling, Oleg Sklyar, Tammo Krueger, Jenny ...
ECIS
2000
13 years 9 months ago
Information Systems Research Education in Australasia: Continuing the Past or Gearing Up for the Future
As the information systems discipline grows, so do the number of programs offering graduate research degrees (GRD). In Australasia these include one year post-graduate (honors) pr...
Beverley G. Hope, M. Fergusson
ICSR
2011
Springer
12 years 11 months ago
Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling
Product Line Architecture (PLA) plays a central role in software product line development. In order to support architecture-level variability modeling, most architecture descriptio...
Jiayi Zhu, Xin Peng, Stan Jarzabek, Zhenchang Xing...
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober