Sciweavers

ICSE
2009
IEEE-ACM
13 years 9 months ago
The Compliance Testing of Software Tools with Respect to the UML Standards Specification - The ArgoUML Case Study
In ICSE’08 we demonstrated the Java UML Lightweight Enumerator (JULE) tool, which supports compliance test generation from modeling standards specifications. When employed in ou...
Panuchart Bunyakiati, Anthony Finkelstein
FPL
2009
Springer
162views Hardware» more  FPL 2009»
13 years 9 months ago
A comparison of FPGA and FPAA technologies for a signal processing application
This paper presents a comparison between two technologies for reconfigurable circuits that are FPGA'se the FPAA's. The comparison is based on a case study of the area of...
Roberto Selow, Heitor S. Lopes, Carlos R. Erig Lim...
MSR
2009
ACM
13 years 9 months ago
On the transfer of evolutionary couplings to industry
In this paper, we describe a case study at Philips Healthcare MRI focusing on evolutionary couplings, i.e., a technique to infer relationships among modules by analyzing their his...
Piërre van de Laar
KCAP
2009
ACM
13 years 9 months ago
Combining vocabulary alignment techniques
Identifying alignments between vocabularies has become a central knowledge engineering activity. A plethora of alignment techniques has been developed over the past years. In this...
Anna Tordai, Jacco van Ossenbruggen, Guus Schreibe...
ICSM
2002
IEEE
13 years 9 months ago
Maintenance of Object Oriented Systems through Re-Engineering: A Case Study
Unregulated evolution of software often leads to software ageing which not only makes the product difficult to maintain but also breaks the consistency between design and impleme...
Manoranjan Satpathy, Nils T. Siebel, Daniel Rodr&i...
ICSM
2002
IEEE
13 years 9 months ago
A Case Study of Unanticipated Incremental Change
Incremental changes add new functionality and properties to software. They are the core of software evolution, maintenance, iterative development, agile development, and similar s...
Václav Rajlich, Prashant Gosavi
ACSAC
2002
IEEE
13 years 9 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
DATE
2010
IEEE
176views Hardware» more  DATE 2010»
13 years 10 months ago
Timing modeling and analysis for AUTOSAR-based software development - a case study
—Safety-critical automotive systems must fulfill hard real-time constraints for reliability and safety. This paper presents a case study for the application of an AUTOSARbased l...
Kay Klobedanz, Christoph Kuznik, Andreas Thuy, Wol...
FSR
2003
Springer
115views Robotics» more  FSR 2003»
13 years 10 months ago
Case Studies of a Borehole Deployable Robot for Limestone Mine Profiling and Mapping
Inherent dangers in mining operations motivate the use of robotic technology for addressing hazardous situations that prevent human access. In the context of this case study, we e...
Aaron Morris, Derek Kurth, Daniel Huber, Warren Wh...
DEBS
2003
ACM
13 years 10 months ago
A case study on event dissemination in an active overlay network environment
In this paper, we describe a case study of the design and development of a group-conferencing tool suite, built on top of an overlay network based event dissemination framework, w...
Sérgio Duarte, José Legatheaux Marti...