Sciweavers

757 search results - page 73 / 152
» Composing Security-Aware Software
Sort
View
130
Voted
SIGSOFT
2009
ACM
16 years 4 months ago
Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models
System specifications have long been expressed through automata-based languages, enabling verification techniques such as model checking. These verification techniques can assess ...
Esteban Pavese, Sebastián Uchitel, Ví...
COORDINATION
2009
Springer
16 years 3 months ago
Multicore Scheduling for Lightweight Communicating Processes
Process-oriented programming is a design methodology in which software applications are constructed from communicating concurrent processes. A process-oriented design is typically ...
Carl G. Ritson, Adam T. Sampson, Fred R. M. Barnes
132
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Plug-and-Play Architectural Design and Verification
Abstract. In software architecture, components represent the computational units of a system and connectors represent the interactions among those units. Making decisions about the...
Shangzhu Wang, George S. Avrunin, Lori A. Clarke
138
Voted
COMPSAC
2009
IEEE
15 years 10 months ago
System Safety Requirements as Control Structures
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
Zhe Chen, Gilles Motet
119
Voted
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 10 months ago
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
Innocentia Dlamini, Martin Olivier, Sihle Sibiya