Sciweavers

2513 search results - page 103 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Towards automatic model synchronization from model transformations
The metamodel techniques and model transformation techniques provide a standard way to represent and transform data, especially the software artifacts in software development. How...
Yingfei Xiong, Dongxi Liu, Zhenjiang Hu, Haiyan Zh...
BDIM
2008
IEEE
185views Business» more  BDIM 2008»
15 years 4 months ago
Addressing the impact of business process changes on software user interfaces
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
Kênia Soares Sousa, Hildeberto Mendonç...
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
15 years 2 months ago
The Modelling of Embedded Systems Using HASoC
We present a design method (HASoC) for the lifecycle modelling of embedded systems that are targeted primarily, but not necessarily, at SoC implementations. The object-oriented de...
M. D. Edwards, P. N. Green
ICSE
2008
IEEE-ACM
15 years 10 months ago
An integrated aspect-oriented model-driven software product line tool suite
Software product line engineering is mostly about the systematic management of commonality and variability between product line members. The effectiveness of this approach thus ve...
Christa Schwanninger, Iris Groher, Markus Völ...
EDBTW
2010
Springer
15 years 4 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...