Sciweavers

747 search results - page 53 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
JSS
2006
65views more  JSS 2006»
13 years 8 months ago
Patterns of conflict among software components
Integrating a system of disparate components to form a single application is still a daunting, high risk task, especially for components with heterogeneous communication expectati...
Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Le...
HOTSWUP
2009
ACM
14 years 1 months ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 2 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
COMPSAC
2004
IEEE
14 years 14 days ago
Safety Tactics for Software Architecture Design
The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
Weihang Wu, Tim Kelly
ATAL
2005
Springer
14 years 2 months ago
Towards an agent oriented programming language with caste and scenario mechanisms
The paper presents an agent-oriented programming language SLABSp. It provides caste and scenario mechanisms in a coherent way to support the caste-centric methodology of agent-ori...
Ji Wang, Rui Shen, Hong Zhu