Sciweavers

3555 search results - page 172 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
RBAC
2000
129views more  RBAC 2000»
15 years 5 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
LCTRTS
1998
Springer
15 years 8 months ago
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
Abstract. Previously published methods for estimation of the worstcase execution time on contemporary processors with complex pipelines and multi-level memory hierarchies result in...
Thomas Lundqvist, Per Stenström
CSE
2009
IEEE
15 years 7 months ago
Optimization of Component Connections for an Embedded Component System
Software component techniques are widely used to enhance productivity and reduce the cost of software systems development. This paper proposes optimization of component connections...
Takuya Azumi, Hiroaki Takada, Hiroshi Oyama
EWCBR
2004
Springer
15 years 7 months ago
Using CBR for Semantic Analysis of Software Specifications
Abstract. Helping software designers in their task implies the development of tools with intelligent capabilities. One such capability is the integration of natural language unders...
Nuno Seco, Paulo Gomes, Francisco C. Pereira
AICOM
2004
105views more  AICOM 2004»
15 years 3 months ago
Using WordNet for case-based retrieval of UML models
Software complexity has increased substantially in the last decade. This has made software development teams work faster and under tight budgets. Reusing software can be a way of s...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...