Sciweavers

516 search results - page 79 / 104
» Design Patterns for Object-Oriented Software Development (Tu...
Sort
View
FASE
2004
Springer
15 years 7 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
SSR
2001
134views more  SSR 2001»
15 years 3 months ago
Generation of visitor components that implement program transformations
The visitor pattern is appealing to developers of program-analysis tools because it separates the design of the data structures that represent a program from the design of softwar...
Kurt Stirewalt, Laura K. Dillon
ECLIPSE
2006
ACM
15 years 7 months ago
FrUiT: IDE support for framework understanding
Frameworks provide means to reuse existing design and functionality, but first require developers to understand how to use them. Learning the correct usage of a framework can be ...
Marcel Bruch, Thorsten Schäfer, Mira Mezini
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 7 months ago
Strategic Versus Tactical Design
Abstract. We seek to distinguish Strategic design decisions (e.g., to adopt a programming paradigm, architectural style, CBSE standard or application framework) from tactical desig...
Amnon H. Eden
IWPC
2002
IEEE
15 years 6 months ago
Building Program Understanding Tools Using Visitor Combinators
Program understanding tools manipulate program represensuch as abstract syntax trees, control-flow graphs, or data-flow graphs. This paper deals with the use of visitor combinat...
Arie van Deursen, Joost Visser