Sciweavers

7557 search results - page 165 / 1512
» Constraints as a design pattern
Sort
View
93
Voted
IASTEDSE
2004
15 years 2 months ago
Experience of communications software evolution and performance improvement with patterns
: Software evolves as requirements or technologies change. Tremendous efforts are often needed to support software evolution as evolution may involve reverse engineering and subseq...
Chung-Horng Lung, Qiang Zhao, Hui Xu, Heine Mar, P...
184
Voted
ESSOS
2011
Springer
14 years 4 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
125
Voted
ICCS
2009
Springer
15 years 7 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
SEW
2007
IEEE
15 years 7 months ago
Testing Patterns
: After over a decade of use, design patterns continue to find new areas of application. In previous work, we presented a contract formalism for specifying patterns precisely, and...
Neelam Soundarajan, Jason O. Hallstrom, Adem Delib...
ICCD
2004
IEEE
119views Hardware» more  ICCD 2004»
15 years 10 months ago
I/O Clustering in Design Cost and Performance Optimization for Flip-Chip Design
I/O placement has always been a concern in modern IC design. Due to flip-chip technology, I/O can be placed throughout the whole chip without long wires from the periphery of the...
Hung-Ming Chen, I-Min Liu, Martin D. F. Wong, Muzh...