Sciweavers

793 search results - page 124 / 159
» Building a Software Factory for Pervasive Systems Developmen...
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 9 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
SEFM
2005
IEEE
15 years 5 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
SIGSOFT
2000
ACM
15 years 4 months ago
Designing robust Java programs with exceptions
Exception handling mechanisms are intended to help developers build robust systems. Although an exception handling mechanism provides a basis for structuring source code dealing w...
Martin P. Robillard, Gail C. Murphy
MIDDLEWARE
2005
Springer
15 years 5 months ago
Context aware sensornet
Advances in MEMS technology, wireless communications, and digital electronics have enabled the development of low-cost, low-power, multifunctional sensor nodes that integrating th...
Huaifeng Qin, Xingshe Zhou
KBSE
2000
IEEE
15 years 4 months ago
Model Checking Programs
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it eas...
Willem Visser, Klaus Havelund, Guillaume P. Brat, ...