Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
: The industrialization of software development induces several changes to the development process as software development becomes distributed over company borders. They cooperativ...
Christoph Rathfelder, Henning Groenda, Ralf Reussn...
This paper presents an approach for comparing two architectures for ontology-based semantic annotation for service interoperability, the EMPOWER architecture using platform specif...
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...