Sciweavers

757 search results - page 50 / 152
» Composing Security-Aware Software
Sort
View
166
Voted
ICSE
1998
IEEE-ACM
15 years 6 months ago
Calibrating the COCOMO II Post-Architecture Model
The COCOMO II model was created to meet the need for a cost model that accounted for future software development practices. This resulted in the formulation of three submodels for...
Bradford Clark, Sunita Devnani-Chulani, Barry W. B...
111
Voted
COMPSAC
2004
IEEE
15 years 6 months ago
Cooperative and Group Testing in Verification of Dynamic Composite Web Services
Verifying Web Services (WS) in a dynamic Service Oriented Architecture (SOA) is challenging because new services can be composed at runtime using existing WS. Furthermore, in a co...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Ning L...
136
Voted
ICFEM
1998
Springer
15 years 6 months ago
Formal Specification of CORBA Services Using Object-Z
Open component architectures, such as CORBA, allow software systems to be composed of independent components. The behavior of components is described with a mixture of an interfac...
Detlef Kreuz
ICSE
2000
IEEE-ACM
15 years 6 months ago
Multibook's test environment
Well engineered Web based courseware and exercises provide flexibility and added value to the students, which goes beyond the traditional text book or CD-ROM based courses. The Mu...
Nathalie Poerwantoro, Abdulmotaleb El-Saddik, Bern...
125
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek