Sciweavers

2421 search results - page 42 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
JOT
2006
91views more  JOT 2006»
13 years 11 months ago
Framework Evolution Tool
Framework development is very expensive, not only because of the intrinsic difficulty related to capturing the domain knowledge, but also because of the lack of appropriate method...
Mariela Cortés, Marcus Fontoura, Carlos Jos...
MSR
2010
ACM
14 years 4 months ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 4 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
COMPSAC
2000
IEEE
14 years 3 months ago
Integration in Component-Based Software Development Using Design Patterns
Components-based development is promising in improving software development productivity and software quality by re-using existing well-tested software components. However, one of...
Stephen S. Yau, Ning Dong
EMSOFT
2004
Springer
14 years 4 months ago
An approach for integrating basic retiming and software pipelining
Basic retiming is an algorithm originally developed for hardware optimization. Software pipelining is a technique proposed to increase instruction-level parallelism for parallel p...
Noureddine Chabini, Wayne Wolf