The success of a software project is largely dependent upon the quality of the Software Requirements Specification (SRS) document, which serves as a medium to communicate user req...
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
In semantics-based component retrieval ontology is usually employed as the semantic basis for component representation and matching. Existing methods always assume that the ontolo...
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. Each of these approaches have been devised with a specific motive and to addres...
An oracle is described for dynamic validation of an application (metadata extraction from scanned documents) where a moderate failure rate is acceptable provided that instances of...
Kurt Maly, Steven J. Zeil, Mohammad Zubair, Ashraf...
Software migration is an inherently knowledge intensive activity, which requires a great amount of expertise and experience from different sources. Knowledge-based approach to sof...
Web application testers need automated, effective approaches to validate the test results of complex, evolving web applications. In previous work, we developed a suite of automate...