Sciweavers

706 search results - page 8 / 142
» Clone-Aware Configuration Management
Sort
View
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier
SSR
1997
93views more  SSR 1997»
13 years 11 months ago
Using Content-Derived Names for Configuration Management
Configuration management of compiled software artifacts (programs, libraries, icons, etc.) is a growing problem as software reuse becomes more prevalent. For an application compos...
Jeffrey K. Hollingsworth, Ethan L. Miller
LISA
2004
13 years 11 months ago
Auto-configuration by File Construction: Configuration Management with newfig
A tool is described that provides for the automatic configuration of systems from a single description. The tool, newfig, uses two simple concepts to provide its functionality: bo...
William LeFebvre, David Snyder
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
VAMOS
2008
Springer
13 years 11 months ago
Weaving Aspect Configurations for Managing System Variability
Variability management is a key concern in the software industry. It allows designers to rapidly propose applications that fit the environment and the user needs, with a certain Q...
Brice Morin, Olivier Barais, Jean-Marc Jéz&...