Sciweavers

2118 search results - page 282 / 424
» Execution of A Requirement Model in Software Development
Sort
View
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 10 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
SAC
2010
ACM
14 years 11 months ago
Inter-DSL coordination support by combining megamodeling and model weaving
Model-Driven Engineering (MDE) advocates the use of models at every step of the software development process. Within this context, a team of engineers collectively and collaborati...
Frédéric Jouault, Bert Vanhooff, Hug...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SIGADA
1998
Springer
15 years 8 months ago
The Rendezvous is Dead - Long Live the Protected Object
This paper outlines the short-comings of rendezvous and the advantages of protected objects as a means of synchronization in Ada 95. A common Ada benchmark suite, ACES, gives the ...
Dragan Macos, Frank Mueller
DEBU
2008
90views more  DEBU 2008»
15 years 4 months ago
Data Aggregation, Heterogeneous Data Sources and Streaming Processing: How Can XQuery Help?
Software infrastructures and applications more and more must deal with data available in a variety of different storage engines, accessible through a multitude of protocols and in...
Marc Van Cappellen, Wouter Cordewiner, Carlo Innoc...