Sciweavers

1199 search results - page 224 / 240
» Software Verification and Software Engineering a Practitione...
Sort
View
COMPSAC
2010
IEEE
14 years 12 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
106
Voted
ACSC
2005
IEEE
15 years 7 months ago
A Formal Approach to Component Adaptation and Composition
Component based software engineering (CBSE), can in principle lead to savings in the time and cost of software development, by encouraging software reuse. However the reality is t...
David Hemer
113
Voted
CODES
2005
IEEE
15 years 7 months ago
Future wireless convergence platforms
As wireless platforms converge to multimedia systems, architectures must converge to support voice, data, and video applications. From a processor architecture perspective, suppor...
C. John Glossner, Mayan Moudgill, Daniel Iancu, Ga...
89
Voted
SENSYS
2005
ACM
15 years 7 months ago
Cyclops: in situ image sensing and interpretation in wireless sensor networks
Despite their increasing sophistication, wireless sensor networks still do not exploit the most powerful of the human senses: vision. Indeed, vision provides humans with unmatched...
Mohammad H. Rahimi, Rick Baer, Obimdinachi I. Iroe...
PROMISE
2010
14 years 8 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...