Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ICECCS
1998
IEEE
123views Hardware» more  ICECCS 1998»
10 years 7 months ago
Applying Slicing Technique to Software Architectures
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural ...
Jianjun Zhao
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
10 years 7 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
10 years 7 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
ICECCS
1998
IEEE
161views Hardware» more  ICECCS 1998»
10 years 7 months ago
A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring timeliness in safety critical systems. First, we introduce a method and its associated technique to model both real-time ta...
Christophe Aussaguès, Vincent David
books