Sciweavers

568 search results - page 42 / 114
» Enforcing traceability in software
Sort
View
BMCBI
2008
113views more  BMCBI 2008»
13 years 10 months ago
SynBlast: Assisting the analysis of conserved synteny information
Motivation: In the last years more than 20 vertebrate genomes have been sequenced, and the rate at which genomic DNA information becomes available is rapidly accelerating. Gene du...
Jörg Lehmann, Peter F. Stadler, Sonja J. Proh...
PLDI
2012
ACM
12 years 13 days ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
SEKE
2004
Springer
14 years 3 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
VAMOS
2007
Springer
14 years 4 months ago
An Aspect-oriented Approach for Representing Variability in Product Line Architecture
Aspect-oriented software development has recently emerged as a new paradigm for systematic modularization and representation of the crosscutting concern. Because the variability i...
Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom
RE
2005
Springer
14 years 3 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...