Sciweavers

1719 search results - page 281 / 344
» Software Re-Documentation Process and Tool
Sort
View
127
Voted
WCRE
1999
IEEE
15 years 7 months ago
Type-Check Elimination: Two Object-Oriented Reengineering Patterns
In reengineering an object-oriented system we want to benefit from the expertise developed in earlier efforts. It is therefore essential to have a way to communicate expertise at ...
Stéphane Ducasse, Tamar Richner, Robb Nebbe
137
Voted
ICRE
1998
IEEE
15 years 7 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
142
Voted
ICSE
1998
IEEE-ACM
15 years 7 months ago
Modeling and Analysis of a Virtual Reality System with Time Petri Nets
The design, implementation, and testing of virtual environments is complicated by the concurrency and realtime features of these systems. Therefore, the development of formal meth...
Rajesh Mascarenhas, Dinkar Karumuri, Ugo A. Buy, R...
135
Voted
ICSE
1997
IEEE-ACM
15 years 7 months ago
Analyzing Partially-Implemented Real-Time Systems
—Most analysis methods for real-time systems assume that all the components of the system are at roughly the same stage of development and can be expressed in a single notation, ...
George S. Avrunin, James C. Corbett, Laura K. Dill...
145
Voted
COMPSAC
2007
IEEE
15 years 7 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie