Sciweavers

3837 search results - page 493 / 768
» Concurrent Engineering support in Software Engineering
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
PPPJ
2006
ACM
15 years 10 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...
SCAM
2005
IEEE
15 years 9 months ago
Fine-Grained Analysis of Change Couplings
In software evolution analysis, many approaches analyze release history data available through versioning systems. The recent investigations of CVS data have shown that commonly c...
Beat Fluri, Harald Gall, Martin Pinzger
WER
2004
Springer
15 years 9 months ago
Towards Requirement Traceability in TROPOS
If we are to be successful in the development of the next generation of agent oriented systems we must deal with the critical issue of requirements traceability. Failure to do so w...
Andréa Castor, Rosa Pinto, Carla T. L. L. S...
AOSD
2003
ACM
15 years 9 months ago
Pointcuts and advice in higher-order languages
Aspect-oriented software design will need to support languages with first-class and higher-order procedures, such as Python, Perl, ML and Scheme. These language features present ...
David B. Tucker, Shriram Krishnamurthi