Sciweavers

568 search results - page 66 / 114
» Enforcing traceability in software
Sort
View
CN
2002
89views more  CN 2002»
13 years 9 months ago
Graphic visualization and animation of LOTOS execution traces
Abstract. Two types of visualization and animation tools for LOTOS execution traces are presented: a translator from LOTOS traces to Message Sequence Charts and a graphic animator....
Bernard Stepien, Luigi Logrippo
COMPSAC
2006
IEEE
14 years 4 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
TAPOS
1998
93views more  TAPOS 1998»
13 years 9 months ago
Object Acquaintance Selection and Binding
Large object-oriented systems have, at least, four characteristics that complicate object communication, i.e the system is distributed and contains large numbers, e.g. thousands, ...
Jan Bosch
ICSE
2007
IEEE-ACM
14 years 10 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
KBSE
2008
IEEE
14 years 4 months ago
A Methodology and Framework for Creating Domain-Specific Development Infrastructures
Domain-specific architectures, middleware platforms, and analysis techniques leverage domain knowledge to help engineers build systems more effectively. An integrated set of these...
George Edwards, Nenad Medvidovic