Sciweavers

757 search results - page 26 / 152
» Composing Security-Aware Software
Sort
View
92
Voted
CBSE
2006
Springer
15 years 1 months ago
Defining and Checking Deployment Contracts for Software Components
Ideally in the deployment phase, components should be composable, and their composition checked. Current component models fall short of this ideal. Most models do not allow composi...
Kung-Kiu Lau, Vladyslav Ukis
PDPTA
2003
14 years 11 months ago
The Application of Software Process Precedence Relationship Formalisms to Concurrent Hardware Systems
In this paper, precedence constraint combination formalisms defined in the software domain are used to define the behavior of hardware systems. Specifically, AND-join and various ...
Kenneth G. Ricks, David Jeff Jackson, B. Earl Well...
ECBS
2002
IEEE
146views Hardware» more  ECBS 2002»
15 years 3 months ago
Top-Down Composition of Software Architectures
This paper discusses an approach for top-down composition of software architectures. First, an architecture is derived that addresses functional requirements only. This architectu...
Hans de Bruin, Hans van Vliet
CAISE
2006
Springer
15 years 1 months ago
A Process-Ontological Model for Software Engineering
Abstract. The term of a "process" is used in Software Engineering (SE) theories and practices in many different ways, which cause confusion. In this paper we will firstly...
Jari Palomäki, Harri Keto
WISES
2003
14 years 11 months ago
Prospects on Software-Agents-Based Applications in Embedded Systems
- Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper presents a further applicati...
Yoseba K. Penya