Sciweavers

434 search results - page 75 / 87
» Security Documentation
Sort
View
CEC
2008
IEEE
14 years 2 months ago
Policy evolution with Genetic Programming: A comparison of three approaches
— In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is now much more complex. Subt...
Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pa...
OOPSLA
2007
Springer
14 years 1 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun
OOPSLA
2007
Springer
14 years 1 months ago
Improving quality together
One recent change in software development is developers starting to take responsibility for the quality of their work by writing and executing automated tests. As with any new act...
David G. Jones, Gordon R. Cameron
SAFECOMP
2007
Springer
14 years 1 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
OOPSLA
2005
Springer
14 years 1 months ago
Model-driven software product lines
iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...