Sciweavers

1003 search results - page 81 / 201
» A Framework for Developing Feature-Rich Software Systems
Sort
View
IRI
2006
IEEE
15 years 4 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
86
Voted
MA
1999
Springer
138views Communications» more  MA 1999»
15 years 2 months ago
ADK--Building Mobile Agents for Network and Systems Management from Reusable Components
Mobile agents, programs that move within a system performing a set of tasks, are an active field of research. The focus of current research, however, is on the development of exe...
Thomas Gschwind, Metin Feridun, Stefan Pleisch
FIW
2007
157views Communications» more  FIW 2007»
14 years 11 months ago
Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines
Software product line engineering provides a systematic approach for the reuse of software assets in the production of similar software systems. For such it employs different varia...
Roberto Silveira Silva Filho, David F. Redmiles
88
Voted
ICSM
2009
IEEE
15 years 4 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
70
Voted
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 4 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke