Sciweavers

3792 search results - page 52 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICSE
2005
IEEE-ACM
16 years 3 months ago
Transformations of software models into performance models
It is widely recognized that in order to make performance validation an integrated activity along the software lifecycle it is crucial to be supported from automated approaches. E...
Vittorio Cortellessa, Antinisca Di Marco, Paola In...
OOPSLA
2005
Springer
15 years 8 months ago
Model-driven software product lines
iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
112
Voted
ATAL
2010
Springer
15 years 4 months ago
An evaluation tool for multiagent development techniques
Masev12 (MAs Software engineering EValuation framework) is an online application that allows analyzing and comparing methods, techniques and environments for developing MAS. Moreo...
Emilia Garcia, Adriana Giret, Vicente J. Botti
103
Voted
CISIS
2009
IEEE
15 years 10 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
EDBTW
2004
Springer
15 years 8 months ago
SPROUT: P2P Routing with Social Networks
In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links. We present a trust model t...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...