Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
In recent publications, two prominent approaches can be found which deal with the complexity of large software systems. First, there is the object–oriented approach, where ”ob...
It is well known that errors introduced early in the development process are commonly the most expensive to correct. The increasingly popular model-driven architecture (MDA) exace...
Abstract. The Object Constraint Language (OCL) can be used to capture strucnstraints in the context of the abstract syntax of modelling languages (metamodels) defined in the MOF me...
Dimitrios S. Kolovos, Richard F. Paige, Fiona A. C...
Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...