Sciweavers

3555 search results - page 130 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
140
Voted
ECSA
2010
Springer
15 years 3 months ago
Linking Design Decisions to Design Models in Model-Based Software Development
Abstract. Numerous design decisions are made in model-based software development which often are not documented explicitly. Hence, the design knowledge is 'in the designers mi...
Patrick Könemann, Olaf Zimmermann
110
Voted
BMCBI
2006
82views more  BMCBI 2006»
15 years 3 months ago
Prediction of a key role of motifs binding E2F and NR2F in down-regulation of numerous genes during the development of the mouse
Background: We previously demonstrated that gene expression profiles during neuronal differentiation in vitro and hippocampal development in vivo were very similar, due to a conse...
Michal Dabrowski, Stein Aerts, Bozena Kaminska
130
Voted
JDCTA
2010
176views more  JDCTA 2010»
14 years 10 months ago
A Context-Aware Framework using Ontology for Smart Phone Platform
Context-awareness has been considered as promising topic in pervasive computing area, but a review of the existing approaches shown that developing diverse application services in...
Yun Her, Su-Kyoung Kim, YoungTaek Jin
133
Voted
ECOOP
2010
Springer
15 years 7 months ago
Embedding Languages without Breaking Tools
Domain-specific languages (DSLs) are increasingly used as embedded languages within general-purpose host languages. DSLs provide a compact, dedicated syntax for specifying parts o...
Lukas Renggli, Tudor Gîrba, Oscar Nierstrasz
100
Voted
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
15 years 7 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby