Sciweavers

1685 search results - page 240 / 337
» Commonality and Variability in Software Engineering
Sort
View
125
Voted
APL
1992
ACM
15 years 7 months ago
Compiler Tools in APL
We present the design and implementation of APL Intrinsic Functions for a Finite State Machine (also known as a Finite State Automaton) which recognizes regular languages, and a P...
Robert Bernecky, Gert Osterburg
133
Voted
B
2007
Springer
15 years 7 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
REFSQ
2010
Springer
15 years 7 months ago
A Domain Ontology Building Process for Guiding Requirements Elicitation
[Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitati...
Inah Omoronyia, Guttorm Sindre, Tor Stålhane...
COMPSAC
2007
IEEE
15 years 7 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
139
Voted
DAC
2007
ACM
15 years 7 months ago
Verification Methodologies in a TLM-to-RTL Design Flow
SoC based system developments commonly employ ESL design ogies and utilize multiple levels of abstract models to provide feasibility study models for architects and development pl...
Atsushi Kasuya, Tesh Tesfaye