Sciweavers

386 search results - page 58 / 78
» Heuristic Evaluations of Bioinformatics Tools: A Development...
Sort
View
JLP
2006
111views more  JLP 2006»
13 years 7 months ago
Executable structural operational semantics in Maude
This paper describes in detail how to bridge the gap between theory and practice when implementing in Maude structural operational semantics described in rewriting logic, where tr...
Alberto Verdejo, Narciso Martí-Oliet
TOOLS
2008
IEEE
14 years 2 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...
COMCOM
2006
121views more  COMCOM 2006»
13 years 7 months ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...
IEEESCC
2007
IEEE
14 years 2 months ago
A Service Discovery Framework based on Linear Composition
Service discovery has been recognised as an important aspect of service oriented computing. This is even more the case when developing service centric systems in which software sy...
Andrea Zisman, Khaled Mahbub, George Spanoudakis
ICSE
2001
IEEE-ACM
14 years 5 days ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed