Sciweavers

3555 search results - page 600 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICSE
2007
IEEE-ACM
16 years 1 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
RTAS
2008
IEEE
15 years 8 months ago
Optimizing the Implementation of Communication in Synchronous Reactive Models
A fundamental asset of a model-based development process is the capability of providing an automatic implementation of the model that preserves its semantics and, at the same time...
Marco Di Natale, Guoqiang Wang, Alberto L. Sangiov...
ICRE
1996
IEEE
15 years 5 months ago
Structuring utterance records of requirements elicitation meetings based on speech act theory
This paper discusses a technique to structure utterance records of the meetings for requirements elicitation based on speech act theory. To elicit requirements to the system to be...
Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, ...
89
Voted
ACMSE
1990
ACM
15 years 5 months ago
Computerizing a machine readable dictionary
Current research in natural language processing is characterized by the development of theories of grammar which strongly depend on the lexicon to drive parsing systems (e.g. Lexi...
Jan G. Wilms
ACSW
2006
15 years 2 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...