Sciweavers

3555 search results - page 222 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IEEECIT
2006
IEEE
15 years 11 months ago
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project
This paper argues about the partitioning in hardware/software co-design and suggests the methodology applying extreme programming to complement the co-design. This approach, contr...
Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter...
CASCON
2007
104views Education» more  CASCON 2007»
15 years 6 months ago
Identifying fault-prone files using static analysis alerts through singular value decomposition
Static analysis tools tend to generate more alerts than a development team can reasonably examine without some form of guidance. In this paper, we propose a technique for leveragi...
Mark Sherriff, Sarah Smith Heckman, Mike Lake, Lau...
AOSD
2007
ACM
15 years 9 months ago
An aspect-oriented approach to bypassing middleware layers
The layered architecture of middleware platforms (such as CORBA, SOAP, J2EE) is a mixed blessing. On the one hand, layers provide services such as demarshaling, session management...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
147
Voted
CONCURRENCY
2002
199views more  CONCURRENCY 2002»
15 years 4 months ago
Application portals: practice and experience
The implementation of multiple Grid computing portals has led us to develop a methodology for Grid portal development that facilitates rapid prototyping and building of portals. B...
Mary Thomas, Maytal Dahan, Kurt Mueller, Stephen M...
ASE
2002
141views more  ASE 2002»
15 years 4 months ago
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by ne...
Martin Traverso, Spiros Mancoridis