Sciweavers

2251 search results - page 247 / 451
» Specification and Implementation Problems for C
Sort
View
113
Voted
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
155
Voted
ICSM
2002
IEEE
15 years 9 months ago
From Legacy to Web through Interaction Modeling
In the context of the CelLEST project, we have been investigating the problem of reengineering and reusing the services provided by legacy applications, running on mainframe hosts...
Eleni Stroulia, Mohammad El-Ramly, Paul G. Sorenso...
POLICY
2001
Springer
15 years 9 months ago
Policy Based SLA Management in Enterprise Networks
The Differentiated Services Architecture defines the mechanisms that are needed to offer multiple classes of services in an IP network. While this model offers significant scaling ...
Dinesh C. Verma, Mandis Beigi, Raymond B. Jennings...
ICSM
1999
IEEE
15 years 8 months ago
Browsing and Searching Software Architectures
Software architecture visualization tools tend to support browsing, that is, exploration by following concepts. If architectural diagrams are to be used during daily software main...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
VLDB
1998
ACM
95views Database» more  VLDB 1998»
15 years 8 months ago
RainForest - A Framework for Fast Decision Tree Construction of Large Datasets
Classification of large datasets is an important data mining problem. Many classification algorithms have been proposed in the literature, but studies have shown that so far no al...
Johannes Gehrke, Raghu Ramakrishnan, Venkatesh Gan...