Sciweavers

568 search results - page 81 / 114
» Enforcing traceability in software
Sort
View
ATAL
2009
Springer
14 years 4 months ago
A framework for monitoring agent-based normative systems
The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a mean...
Sanjay Modgil, Noura Faci, Felipe Rech Meneguzzi, ...
LCPC
2007
Springer
14 years 4 months ago
Language Extensions in Support of Compiler Parallelization
Abstract. In this paper, we propose an approach to automatic compiler parallelization based on language extensions that is applicable to a broader range of program structures and a...
Jun Shirako, Hironori Kasahara, Vivek Sarkar
WER
2007
Springer
14 years 4 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
EUROMICRO
2006
IEEE
14 years 4 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
ICSM
2006
IEEE
14 years 3 months ago
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding
One approach to supporting program comprehension involves binding concepts to source code. Previously proposed approaches to concept binding have enforced nonoverlapping boundarie...
Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahda...