Sciweavers

1069 search results - page 121 / 214
» Automatic Generation of Language-based Tools
Sort
View
CCS
2007
ACM
15 years 6 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
FASE
2007
Springer
15 years 6 months ago
Contract-Driven Development
Although unit tests are recognized as an important tool in software development, programmers prefer to write code, rather than unit tests. Despite the emergence of tools like JUni...
Bertrand Meyer
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
15 years 5 months ago
A Policy-Based Hierarchical Approach for Management of Grids and Networks
Grids are distributed infrastructures that have been used as an important and powerful resource for distributed computing. Since the nodes of a grid can potentially be located in ...
Tiago Fioreze, Ricardo Neisse, Lisandro Zambenedet...
WCRE
2003
IEEE
15 years 5 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
ECMDAFA
2009
Springer
127views Hardware» more  ECMDAFA 2009»
14 years 9 months ago
Derivation and Refinement of Textual Syntax for Models
Textual Syntax (TS) as a form of model representation has made its way to the Model-Driven Software Development community and is considered a viable alternative to graphical repres...
Florian Heidenreich, Jendrik Johannes, Sven Karol,...