Sciweavers

897 search results - page 83 / 180
» Reuse, Validation and Verification of System Development Pro...
Sort
View
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
ICSE
2008
IEEE-ACM
14 years 8 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
EWCBR
2000
Springer
13 years 11 months ago
Active Delivery for Lessons Learned Systems
Lessons learned processes, and software systems that support them, have been developed by many organizations (e.g., all USA military branches, NASA, several Department of Energy or...
Rosina Weber, David W. Aha, Héctor Mu&ntild...
ROOM
2000
13 years 9 months ago
Statecharts as Protocols for Objects
For the specification of object-oriented systems, usually several models representing different views are developed. The necessary integration of views is often delayed until impl...
Annette Laue, Matthias Liedtke, Daniel Moldt, Ivan...
ENTCS
2010
82views more  ENTCS 2010»
13 years 8 months ago
A Strict-Observational Interface Theory for Analysing Service Orchestrations
Service oriented computing is an accepted architectural style for developing large, distributed software systems. A particular promise of such architectures is service orchestrati...
Philip Mayer, Andreas Schroeder, Sebastian S. Baue...