Sciweavers

137 search results - page 22 / 28
» Case Analysis of Criminal Behaviour
Sort
View
ICSM
2009
IEEE
14 years 2 months ago
Understanding source package organization using the hybrid model
Within a large, object-oriented software system it is common to partition the classes into a set of packages, which implicitly serve as a set of coarsely-grained logical design un...
Xinyi Dong, Michael W. Godfrey
ASWEC
2007
IEEE
14 years 1 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
ASWEC
2006
IEEE
14 years 1 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
SAFECOMP
2001
Springer
13 years 12 months ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
13 years 11 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock