Sciweavers

1432 search results - page 196 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
ESORICS
2012
Springer
13 years 6 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
WOSP
2005
ACM
15 years 9 months ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla
PPPJ
2006
ACM
15 years 10 months ago
Cost and benefit of rigorous decoupling with context-specific interfaces
In Java programs, classes are coupled to each other through the use of typed references. In order to minimize coupling without changing the executed code, interfaces can be introd...
Florian Forster
ICSE
2010
IEEE-ACM
15 years 9 months ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the forme...
Friedrich Steimann, Andreas Thies
195
Voted
BXML
2004
15 years 5 months ago
AMACONT: A System Architecture for Adaptive Multimedia Web Applications
Abstract: Engineering personalized ubiquitous Web applications requires to develop adaptable Web content as well as to automatically adjust it to varying client devices and dynamic...
Michael Hinz, Zoltán Fiala