Sciweavers

757 search results - page 55 / 152
» Composing Security-Aware Software
Sort
View
DATE
1997
IEEE
133views Hardware» more  DATE 1997»
15 years 7 months ago
Hierarchical scheduling and allocation of multirate systems on heterogeneous multiprocessors
This paper describes new algorithms for systemlevel software synthesis, namely the scheduling and allocation of a set of complex tasks running at multiple rates on a heterogeneous...
Yanbing Li, Wayne Wolf
110
Voted
FORTE
2007
15 years 4 months ago
Composition of Model Programs
Model programs are a useful formalism for software testing and design analysis. They are used in industrial tools, such as SpecExplorer, as a compact, expressive and precise way to...
Margus Veanes, Colin Campbell, Wolfram Schulte
116
Voted
IM
2007
15 years 4 months ago
Policy-driven Business Management over Web Services
Service-oriented Architecture allows for reusable services to be composed in such a way that business tasks or activities are easily satisfied. However, currently there is a abst...
Stephen Gorton, Stephan Reiff-Marganiec
CAINE
2001
15 years 4 months ago
Internet-Based Global Decision Making System Architecture
: The far-reaching Internet and the relevant technologies on intelligence shed a light of hope for those problems that seek solutions that are suitable for global perspectives, sup...
Charles J. Kim, Jamshid Goshtasbi
FIW
1997
15 years 4 months ago
An Object-Oriented Approach to Feature Interaction
In this paper, we address the feature interaction problem as a software composition problem. We show the applicability of a new programming style, feature-oriented programming (FO...
Christian Prehofer