This paper reports the results from an action research project which studies the benefits of documenting the evolution and the rationale for the evolution of a requirements specif...
Linear equality and inequality constraints arise naturally in specifying many aspects of user interfaces, such as requiring that one window be to the left of another, requiring th...
Alan Borning, Kim Marriott, Peter J. Stuckey, Yi X...
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
In traditional Software Engineering approaches, an application is described as a composite entity containing all its components. This approach is no longer relevant in modern Softw...
Jacky Estublier, Idrissa A. Dieng, Eric Simon, Ger...
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...