Sciweavers

3555 search results - page 130 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECSA
2010
Springer
15 years 1 months ago
Linking Design Decisions to Design Models in Model-Based Software Development
Abstract. Numerous design decisions are made in model-based software development which often are not documented explicitly. Hence, the design knowledge is 'in the designers mi...
Patrick Könemann, Olaf Zimmermann
BMCBI
2006
82views more  BMCBI 2006»
15 years 1 months ago
Prediction of a key role of motifs binding E2F and NR2F in down-regulation of numerous genes during the development of the mouse
Background: We previously demonstrated that gene expression profiles during neuronal differentiation in vitro and hippocampal development in vivo were very similar, due to a conse...
Michal Dabrowski, Stein Aerts, Bozena Kaminska
JDCTA
2010
176views more  JDCTA 2010»
14 years 8 months ago
A Context-Aware Framework using Ontology for Smart Phone Platform
Context-awareness has been considered as promising topic in pervasive computing area, but a review of the existing approaches shown that developing diverse application services in...
Yun Her, Su-Kyoung Kim, YoungTaek Jin
ECOOP
2010
Springer
15 years 5 months ago
Embedding Languages without Breaking Tools
Domain-specific languages (DSLs) are increasingly used as embedded languages within general-purpose host languages. DSLs provide a compact, dedicated syntax for specifying parts o...
Lukas Renggli, Tudor Gîrba, Oscar Nierstrasz
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
15 years 5 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby