Sciweavers

2253 search results - page 239 / 451
» The ComFoRT Reasoning Framework
Sort
View
87
Voted
CSFW
2004
IEEE
15 years 2 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
106
Voted
EH
2004
IEEE
117views Hardware» more  EH 2004»
15 years 2 months ago
Multi-objective Optimization of a Parameterized VLIW Architecture
The use of Application Specific Instruction-set Processors (ASIP) in embedded systems is a solution to the problem of increasing complexity in the functions these systems have to ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
100
Voted
FASE
2006
Springer
15 years 2 months ago
Relation of Code Clones and Change Couplings
Abstract. Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution. It is broadly assumed that the ...
Reto Geiger, Beat Fluri, Harald Gall, Martin Pinzg...
94
Voted
UML
1997
Springer
15 years 2 months ago
Evaluation of Object-Oriented Modelling Languages: A Comparison Between OML and UML
The following article is motivated by the current efforts of the Object Management Group (OMG) to standardize object-oriented modelling languages. In the face of the great economi...
Michael Prasse
FM
1991
Springer
164views Formal Methods» more  FM 1991»
15 years 2 months ago
Formalizing Design Spaces: Implicit Invocation Mechanisms
An important goal of software engineering is to exploit commonalities in system design in order to reduce the complexity of building new systems, support largescale reuse, and pro...
David Garlan, David Notkin