Sciweavers

980 search results - page 153 / 196
» Modeling Domain Variability in Requirements Engineering with...
Sort
View
ECAI
2008
Springer
14 years 11 months ago
The Impact of Constraint Programming
Constraint satisfaction problems (CSPs) are ubiquitous in many real-world contexts. However, modeling a problem as a CSP can be very challenging, usually requiring considerable ex...
Pascal Van Hentenryck
ICSE
2001
IEEE-ACM
15 years 2 months ago
An Empirical Study of Global Software Development: Distance and Speed
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycl...
James D. Herbsleb, Audris Mockus, Thomas A. Finhol...
ISSTA
2010
ACM
14 years 11 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
ACSAC
2009
IEEE
15 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
JUCS
2006
94views more  JUCS 2006»
14 years 9 months ago
UML-Based Modeling of Data-oriented WEB Applications
Abstract: Recently a growing demand has arisen for methods for the development of smalland medium scale Web Information Systems (WIS). Web applications are being built in a rapidly...
Attila Adamkó