Sciweavers

3555 search results - page 128 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TOSEM
2008
168views more  TOSEM 2008»
15 years 1 months ago
Developing and debugging algebraic specifications for Java classes
Modern programs make extensive use of reusable software libraries. For example, a study of a number of large Java applications shows that between 17% and 30% of the classes in tho...
Johannes Henkel, Christoph Reichenbach, Amer Diwan
ECAI
2008
Springer
15 years 3 months ago
XTT+ Rule Design Using the ALSV(FD)
This paper presents advances in Set Attributive Logic and its application to develop tabular rule-based systems within the XTT framework. The primary goal is to extend the expressi...
Grzegorz J. Nalepa, Antoni Ligeza
ACSW
2007
15 years 3 months ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
DSVIS
2003
Springer
15 years 6 months ago
Bridging the Gap: Developing 2D and 3D User Interfaces with the IDEAS Methodology
Most user interface development methodologies have been conceived based on the experience from the development of traditional PC-based systems. However, computer and displays techn...
José Pascual Molina, Pascual Gonzále...
ESE
2006
105views Database» more  ESE 2006»
15 years 1 months ago
Replaying development history to assess the effectiveness of change propagation tools
As developers modify software entities such as functions or variables to introduce new features, enhance old ones, or fix bugs, they must ensure that other entities in the software...
Ahmed E. Hassan, Richard C. Holt