Sciweavers

1304 search results - page 116 / 261
» Model-Driven Engineering for Requirements Analysis
Sort
View
FASE
2009
Springer
15 years 5 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
76
Voted
SIGSOFT
2000
ACM
15 years 2 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
ICSE
2001
IEEE-ACM
15 years 2 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
SIGDOC
2006
ACM
15 years 4 months ago
Workshop: communicating design patterns with TRIZ
This work will present elements of Genrich Altshuller’s Theory of Inventive Problem Solving, also known as TRIZ, and use them to describe the structural patterns found in the Ga...
John W. Stamey Jr., Ellen Domb
SIGSOFT
2006
ACM
15 years 11 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken