Sciweavers

611 search results - page 106 / 123
» Development of SOA-Based Software Systems - an Evolutionary ...
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
ATAL
2009
Springer
15 years 9 months ago
Operational semantics of goal models in adaptive agents
Several agent-oriented software engineering methodologies address the emerging challenges posed by the increasing need of adaptive software. A common denominator of such methodolo...
Mirko Morandini, Loris Penserini, Anna Perini
117
Voted
EICS
2009
ACM
15 years 9 months ago
GT/SD: performance and simplicity in a groupware toolkit
Many tools exist for developing real-time distributed groupware, but most of these tools focus primarily on the performance of the resulting system, or on simplifying the developm...
Brian de Alwis, Carl Gutwin, Saul Greenberg
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 8 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
149
Voted
LCTRTS
2010
Springer
15 years 12 days ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla