Sciweavers

151 search results - page 12 / 31
» Reuse through Requirements Traceability
Sort
View
TES
2001
Springer
14 years 3 days ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
ICSR
2004
Springer
14 years 1 months ago
Framed Aspects: Supporting Variability and Configurability for AOP
Aspect oriented programming (AOP) seeks to decompose concerns which crosscut system structure into more manageable modules. However, current AOP techniques alone lack the configura...
Neil Loughran, Awais Rashid
RE
2005
Springer
14 years 1 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
RSP
2003
IEEE
132views Control Systems» more  RSP 2003»
14 years 29 days ago
Rapid Exploration of Pipelined Processors through Automatic Generation of Synthesizable RTL Models
As embedded systems continue to face increasingly higher performance requirements, deeply pipelined processor architectures are being employed to meet desired system performance. ...
Prabhat Mishra, Arun Kejariwal, Nikil Dutt
CODES
2002
IEEE
14 years 20 days ago
Energy savings through compression in embedded Java environments
Limited energy and memory resources are important constraints in the design of an embedded system. Compression is an useful and widely employed mechanism to reduce the memory requ...
Guangyu Chen, Mahmut T. Kandemir, Narayanan Vijayk...