Sciweavers

694 search results - page 121 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
KBSE
2005
IEEE
15 years 5 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...
ISPASS
2008
IEEE
15 years 6 months ago
Program Phase Detection based on Critical Basic Block Transitions
Many programs go through phases as they execute. Knowing where these phases begin and end can be beneficial. For example, adaptive architectures can exploit such information to lo...
Paruj Ratanaworabhan, Martin Burtscher
75
Voted
SIGSOFT
2002
ACM
16 years 14 days ago
Negative scenarios for implied scenario elicitation
Scenario-based specifications such as Message Sequence Charts (MSCs) are popular for requirement elicitation and specification. MSCs describe two distinct aspects of a system: on ...
Sebastián Uchitel, Jeff Kramer, Jeff Magee
EMSOFT
2007
Springer
15 years 5 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
RE
2010
Springer
14 years 6 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa