Sciweavers

3792 search results - page 52 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
Transformations of software models into performance models
It is widely recognized that in order to make performance validation an integrated activity along the software lifecycle it is crucial to be supported from automated approaches. E...
Vittorio Cortellessa, Antinisca Di Marco, Paola In...
OOPSLA
2005
Springer
14 years 3 months ago
Model-driven software product lines
iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
ATAL
2010
Springer
13 years 11 months ago
An evaluation tool for multiagent development techniques
Masev12 (MAs Software engineering EValuation framework) is an online application that allows analyzing and comparing methods, techniques and environments for developing MAS. Moreo...
Emilia Garcia, Adriana Giret, Vicente J. Botti
CISIS
2009
IEEE
14 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
EDBTW
2004
Springer
14 years 3 months ago
SPROUT: P2P Routing with Social Networks
In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links. We present a trust model t...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...