Sciweavers

1700 search results - page 56 / 340
» Specifying and implementing refactorings
Sort
View
POLICY
2009
Springer
15 years 10 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
APSEC
1996
IEEE
15 years 8 months ago
A Dialog-Oriented User Interface Generation Mechanism
Nowadays, for GUI application development, a number of interface builders make possible for the user to create user interfaces easily and UIMSs help to specify and design user int...
J. Baeg, Y. Fukazawa
HPCNCS
2007
15 years 5 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
EUROSYS
2006
ACM
16 years 1 months ago
A quantitative analysis of aspects in the eCos kernel
Nearly ten years after its first presentation and five years after its first application to operating systems, the suitability of AspectOriented Programming (AOP) for the devel...
Daniel Lohmann, Fabian Scheler, Reinhard Tartler, ...
XPU
2007
Springer
15 years 10 months ago
Empirical Evidence Principle and Joint Engagement Practice to Introduce XP
Bringing software process change to an organisation is a real challenge. The authors have shown a sample attempt to carry out a process change and then reflected on its results and...
Lech Madeyski, Wojciech Biela