Sciweavers

554 search results - page 68 / 111
» Mapping Business Processes to Software Design Artifacts
Sort
View
ICSE
2003
IEEE-ACM
14 years 8 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
CODES
2007
IEEE
14 years 2 months ago
HW/SW co-design for Esterel processing
We present a co-synthesis approach that accelerates reactive software processing by moving the calculation of complex expressions into external combinational hardware. The startin...
Sascha Gädtke, Claus Traulsen, Reinhard von H...
APSEC
2003
IEEE
14 years 1 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 28 days ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
ICSE
2005
IEEE-ACM
14 years 8 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu