Sciweavers

2236 search results - page 265 / 448
» Secure Software Design in Practice
Sort
View
APSEC
2004
IEEE
15 years 6 months ago
JCMP: Linking Architecture with Component Building
Approaches to enforcing communication integrity in the implementation, exemplified by ArchJava, consider only architectural constraints, without taking into account the late integ...
Guoqing Xu, Zongyuan Yang, Haitao Huang
ICFEM
2009
Springer
15 years 25 days ago
A Compositional Approach on Modal Specifications for Timed Systems
Abstract. On the one hand, modal specifications are classic, convenient, and expressive mathematical objects to represent interfaces of component-based systems. On the other hand, ...
Nathalie Bertrand, Axel Legay, Sophie Pinchinat, J...
ECBS
2005
IEEE
162views Hardware» more  ECBS 2005»
15 years 8 months ago
Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness
Architecture modeling is practiced extensively in the software industry but there is little attention paid to the traceability, verifiability and completeness of architecture desi...
Antony Tang, Jun Han
CAISE
2003
Springer
15 years 8 months ago
Aligning Application Architecture to the Business Context
Abstract. Alignment of application architecture to business architecture is a central problem in the design, acquisition and implementation of information systems in current large-...
Roel Wieringa, Henk M. Blanken, Maarten M. Fokking...
ICSE
2008
IEEE-ACM
16 years 3 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard