Sciweavers

3555 search results - page 241 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
MSR
2005
ACM
15 years 10 months ago
Mining evolution data of a product family
Diversification of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
ENVSOFT
2007
127views more  ENVSOFT 2007»
15 years 5 months ago
River model calibration, from guidelines to operational support tools
Numerical modelling is now used routinely to make predictions about the behaviour of environmental systems. Model calibration remains a critical step in the modelling process and ...
Jean-Philippe Vidal, Sabine Moisan, Jean-Baptiste ...
CIKM
2001
Springer
15 years 9 months ago
Automatic Recognition of Distinguishing Negative Indirect History Language in Judicial Opinions
We describe a model-based filtering application that generates candidate case-to-case distinguishing citations. We developed the system to aid editors in identifying indirect rela...
Jack G. Conrad, Daniel P. Dabney
SE
2007
15 years 6 months ago
Building a process layer for business applications using the blackboard pattern
Abstract: Contemporary business applications often employ a process layer in order to coordinate automated activities. One option to build such a layer is to use a workflow manage...
Stefan Kleine Stegemann, Burkhardt Funk, Thomas Sl...
AOSD
2007
ACM
15 years 9 months ago
ATOLL: aspect-oriented toll system
Product line development places emphasis on quality attributes like understandability, maintainability, reusability and variability. Better modularization techniques like ...
Luis Daniel Benavides Navarro, Christa Schwanninge...