Sciweavers

915 search results - page 146 / 183
» Security in Business Process Engineering
Sort
View
PASTE
2005
ACM
14 years 2 months ago
MonDe: safe updating through monitored deployment of new component versions
Safely updating software at remote sites is a cautious balance of enabling new functionality and avoiding adverse effects on existing functionality. A useful first step in this p...
Jonathan E. Cook, Alessandro Orso
WOSP
2004
ACM
14 years 2 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
OOPSLA
2004
Springer
14 years 2 months ago
Example centric programming
Programmers tend to understand programs by thinking of concrete examples. Example Centric Programming seeks to add IDE support for examples throughout the process of programming. ...
Jonathan Edwards
HOTSWUP
2009
ACM
14 years 1 months ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
AGENTS
2001
Springer
14 years 1 months ago
Evaluation of modeling techniques for agent-based systems
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Onn Shehory, Arnon Sturm