A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Most software for embedded systems, including digital signal processing systems, is coded in assembly language. For both understanding the software and for reverse compiling it to...
This paper presents an optimisation technique which automatically inlines certain classes within their enclosing class. Inlining a class involves inserting the fields and methods ...
The initial step of any software engineering methodology is to form requirements. Recently, a goal-oriented approach to requirements has been proposed and argued to be beneficial...
Software inspections are established means of ensuring quality in software engineering. The traditional paper-based inspections are considered too laborious for widespread usage, ...
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Design notations play an important role in designing software. Agent UML (AUML), which extends the widelyused UML notation, has proposed a number of notations for modelling agent ...
This paper proposes a stochastic voting for testing a large number of Web Services (WS) under group testing. In the future, a large number of WS will be available and they need to...
Wei-Tek Tsai, Dawei Zhang, Raymond A. Paul, Yinong...