Sciweavers

SIGADA
2004
Springer
14 years 23 days ago
Re-engineering global variables in Ada
This paper describes one method for identifying global variables in Ada procedures and adding them to the parameter list of appropriate procedures. Global variables, ones that are...
Ricky E. Sward, A. T. Chamillard
SIGADA
2004
Springer
14 years 23 days ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
SIGADA
2004
Springer
14 years 23 days ago
Cheddar: a flexible real time scheduling framework
Frank Singhoff, Jérôme Legrand, Laure...
SIGADA
2004
Springer
14 years 23 days ago
GNAT: on the road to Ada 2005
The GNAT Development Team is directly involved with the Ada 2005 effort, both participating in the Ada Rapporteur Group (ARG), and implementing and testing the new features propo...
Javier Miranda, Edmond Schonberg
SIGADA
2004
Springer
14 years 23 days ago
Model driven development with Ada
System and software development has become an increasingly complex science. With so many emerging devices, processors, systems specification languages, software implementation lan...
Andy Lapping
SIGADA
2004
Springer
14 years 23 days ago
Teaching graphics using Ada
This paper describes several tools related to the Ada language that were developed to support the teaching of a computer graphics course. These tools include an updated and improv...
C. Wayne Brown
SIGADA
2004
Springer
14 years 23 days ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
SIGADA
2004
Springer
14 years 23 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
SIGADA
2004
Springer
14 years 23 days ago
A refactoring tool for Ada 95
Refactoring is a technique for restructuring code to improve its design. A tool for automatically applying refactoring transformations to Ada 95 programs is described. The tool is...
Paul Anderson