Sciweavers

1713 search results - page 276 / 343
» Modeling and Engineering Adaptive Complex Systems
Sort
View
SAC
2010
ACM
13 years 9 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
SCAM
2008
IEEE
14 years 3 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa
ICSE
2008
IEEE-ACM
14 years 9 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
FIW
2007
157views Communications» more  FIW 2007»
13 years 10 months ago
Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines
Software product line engineering provides a systematic approach for the reuse of software assets in the production of similar software systems. For such it employs different varia...
Roberto Silveira Silva Filho, David F. Redmiles
EUROGRAPHICS
2010
Eurographics
14 years 4 months ago
Interactive High-Quality Visualization of Higher-Order Finite Elements
Higher-order finite element methods have emerged as an important discretization scheme for simulation. They are increasingly used in contemporary numerical solvers, generating a ...
Markus Üffinger, Steffen Frey, Thomas Ertl