Sciweavers

757 search results - page 22 / 152
» Composing Security-Aware Software
Sort
View
SEKE
2010
Springer
14 years 8 months ago
Towards an Automation of Software Evolution Good Practices
It is well known that software evolution is an inescapable activity in the software lifecycle. In order to prevent the negative effects of this activity (decreased quality, increa...
Chouki Tibermacine, Soraya Sakhraoui, Vincent Le G...
ASWEC
2008
IEEE
15 years 4 months ago
An Exploration of Power-Law in Use-Relation of Java Software Systems
A software component graph, where a node represents a component and an edge represents a use-relation between components, is widely used for analysis methods of software engineeri...
Makoto Ichii, Makoto Matsushita, Katsuro Inoue
QUATIC
2007
IEEE
15 years 4 months ago
Towards Paradigm-Independent Software Assessment
The milestones of the history of software development are paradigm shifts. Each paradigm brought its own features and new ways of composing them to assemble software systems. Unde...
Sergio Bryton, Fernando Brito e Abreu
ICSM
2006
IEEE
15 years 4 months ago
Working Session: Information Retrieval Based Approaches in Software Evolution
During software evolution a collection of related artifacts with different representations are created. Some of these are composed of structured data (e.g., analysis data), some c...
Andrian Marcus, Andrea De Lucia, Jane Huffman Haye...
EMSOFT
2001
Springer
15 years 2 months ago
Hierarchical Approach for Design of Multi-vehicle Multi-modal Embedded Software
Abstract. Embedded systems composed of hardware and software components are designed to interact with a physical environment in real-time in order to fulfill control objectives an...
Tak-John Koo, Judith Liebman, Cedric Ma, Shankar S...