Starting with a UML specification that captures the underlying functionality of some given Java-based concurrent system, we describe a systematic way to construct, from this speci...
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
Bidirectional transformation is a pair of transformations: a view function and a backward transformation. A view function maps one data structure called source onto another called...
: Producing More Reliable Software: Mature Software Engineering Process vs. State-of-the-Art Technology? A customer of high assurance software recently sponsored a software enginee...
The possible variability of project delay is useful information to understand and mitigate the project delay risk. However, it is not sufficiently considered in the literature con...
Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mar...