We present a mapping of Best Practices from the field of software engineering to the practice of discrete event simulation model construction. There are obvious parallels between ...
Brian D. Withers, A. Alan B. Pritsker, David H. Wi...
Software infrastructures and applications more and more must deal with data available in a variety of different storage engines, accessible through a multitude of protocols and in...
Marc Van Cappellen, Wouter Cordewiner, Carlo Innoc...
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
To assure dependable onboard evolution, we have developed a methodology called guarded software upgrading (GSU). In this paper, we focus on a low-cost approach to error containmen...
Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Cha...