Sciweavers

2513 search results - page 96 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
APSEC
2003
IEEE
14 years 3 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
COMPSAC
1998
IEEE
14 years 2 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
SBACPAD
2008
IEEE
126views Hardware» more  SBACPAD 2008»
14 years 4 months ago
A Software Transactional Memory System for an Asymmetric Processor Architecture
Due to the advent of multi-core processors and the consequent need for better concurrent programming abstractions, new synchronization paradigms have emerged. A promising one, kno...
Felipe Goldstein, Alexandro Baldassin, Paulo Cento...
EUROMICRO
2007
IEEE
14 years 4 months ago
Using Model Differencing for Architecture-level Regression Testing
Regression testing can be systematically applied at the software architecture level in order to reduce the cost of retesting modified systems, and also to assess the regression t...
Henry Muccini
MODELS
2009
Springer
14 years 4 months ago
Towards systematic ensuring well-formedness of software product lines
Variability modelling with feature models is one key technique for specifying the problem space of software product lines (SPLs). To allow for the automatic derivation of a concre...
Florian Heidenreich