Sciweavers

2030 search results - page 170 / 406
» Checklists for Software Engineering Case Study Research
Sort
View
B
2007
Springer
14 years 9 days ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
EDBTW
2010
Springer
13 years 11 months ago
Flexible Dataspace Management Through Model Management
The vision of dataspaces has been articulated as providing various of the benefits of classical data integration but with reduced up-front costs, which, combined with opportunitie...
Cornelia Hedeler, Khalid Belhajjame, Lu Mao, Norma...
SEKE
2005
Springer
14 years 1 months ago
An Empirical Study on Limits of Clone Unification Using Generics
Generics (templates) attempt to unify similar program structures to avoid redundancy. How well do generics serve this purpose in practice? We try to answer this question through e...
Hamid Abdul Basit, Damith C. Rajapakse, Stan Jarza...
CAISE
2008
Springer
13 years 10 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
ECBS
2010
IEEE
147views Hardware» more  ECBS 2010»
14 years 1 months ago
Supporting Customizable Architectural Design Decision Management
—When engineering complex software systems, the key Architectural Design Decisions (ADD) and the reasoning underlying those decisions need to be fully understood by all stakehold...
Lianping Chen, Muhammad Ali Babar