Sciweavers

1925 search results - page 129 / 385
» Documenting software systems with views
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 4 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ECOOPW
1998
Springer
15 years 9 months ago
Mapping Business Processes to Software Design Artifacts
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
Pavel Hruby
ECLIPSE
2005
ACM
15 years 6 months ago
ConcernMapper: simple view-based separation of scattered concerns
We introduce ConcernMapper, an Eclipse plug-in for experimenting with techniques for advanced separation of concerns. ConcernMapper supports development and maintenance tasks invo...
Martin P. Robillard, Frédéric Weigan...
CIDR
2003
121views Algorithms» more  CIDR 2003»
15 years 6 months ago
Towards High Performance Peer-to-Peer Content and Resource Sharing Systems
Peer-to-peer sharing systems are becoming increasingly popular and an exciting new class of innovative, internet-based data management systems. In these systems, users contribute ...
Peter Triantafillou, Chryssani Xiruhaki, Manolis K...
BPM
2008
Springer
188views Business» more  BPM 2008»
15 years 6 months ago
Social Software for Modeling Business Processes
Abstract. The aim of this paper is to show how the use of social networks may help users to behave as modelers they trust. Users are guided in this respect within the context of an...
Agnes Koschmider, Minseok Song, Hajo A. Reijers