Sciweavers

391 search results - page 6 / 79
» Domain engineered configuration control
Sort
View
SIS
2008
13 years 10 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
TON
2010
168views more  TON 2010»
13 years 3 months ago
Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation
Abstract--We present a number of significant engineering insights on what makes a good configuration for medium- to largesize wireless mesh networks (WMNs) when the objective funct...
Jun Luo, Catherine Rosenberg, André Girard
SCM
2001
13 years 10 months ago
Defining and Supporting Concurrent Engineering Policies in SCM
Software Configuration Management addresses roughly two areas, the first and older one concerns the storage of the entities produced during the software project; the second one con...
Jacky Estublier, Sergio Cárdenas-Garc&iacut...
EUROMICRO
1999
IEEE
14 years 1 months ago
Processing Requirements by Software Configuration Management
Short development life cycles, the importance of timeto-market and fast changes in technology influence the requirements engineering process. Requirements are exposed to changes d...
Ivica Crnkovic, Peter J. Funk, Magnus Larsson
ICSE
1994
IEEE-ACM
14 years 25 days ago
On the Inference of Configuration Structures from Source Code
We apply mathematical concept analysis to the problem of infering configuration structures from existing source code. Concept analysis has been developed by German mathematicians ...
Maren Krone, Gregor Snelting