派博傳思國(guó)際中心

標(biāo)題: Titlebook: Component-Based Software Engineering; 11th International S Michel R. V. Chaudron,Clemens Szyperski,Ralf Reuss Conference proceedings 2008 S [打印本頁(yè)]

作者: 可樂(lè)    時(shí)間: 2025-3-21 16:57
書(shū)目名稱(chēng)Component-Based Software Engineering影響因子(影響力)




書(shū)目名稱(chēng)Component-Based Software Engineering影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Component-Based Software Engineering網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Component-Based Software Engineering網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Component-Based Software Engineering被引頻次




書(shū)目名稱(chēng)Component-Based Software Engineering被引頻次學(xué)科排名




書(shū)目名稱(chēng)Component-Based Software Engineering年度引用




書(shū)目名稱(chēng)Component-Based Software Engineering年度引用學(xué)科排名




書(shū)目名稱(chēng)Component-Based Software Engineering讀者反饋




書(shū)目名稱(chēng)Component-Based Software Engineering讀者反饋學(xué)科排名





作者: Interim    時(shí)間: 2025-3-21 21:32

作者: JOG    時(shí)間: 2025-3-22 01:08

作者: 高爾夫    時(shí)間: 2025-3-22 05:38
Component-Based Software Engineering978-3-540-87891-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 狼群    時(shí)間: 2025-3-22 12:48

作者: 離開(kāi)真充足    時(shí)間: 2025-3-22 13:26

作者: 離開(kāi)真充足    時(shí)間: 2025-3-22 17:31

作者: 伴隨而來(lái)    時(shí)間: 2025-3-22 22:19
Hans-Joachim Mittag,Katharina Schülleronent services. However, these execution durations are specific for an execution platform (i.e. its resources such as CPU) and for a usage profile. Reusing an existing component on different execution platforms up to now required repeated measurements of the concerned components for each relevant co
作者: 我不死扛    時(shí)間: 2025-3-23 05:24
Statistik, Daten und statistische Methodenas those compliant to J2EE, a usual way to enforce access control is to define Access Control Configurations (ACCs) for components in a declarative manner. These ACCs can be enforced by the J2EE security service to grant or deny access requests to components. However, it is difficult for the develop
作者: 不適    時(shí)間: 2025-3-23 05:32
https://doi.org/10.1007/978-3-658-28955-3olution makes a set of Java vulnerabilities directly exploitable by malicious code: access to classes in multi-component platforms, and access to object in SOP, is granted to them with often no control..This paper defines two taxonomies that characterize vulnerabilities in Java components: the vulne
作者: ADOPT    時(shí)間: 2025-3-23 13:45
Elemente der Wahrscheinlichkeitsrechnungmbedded and pervasive environments. In this paper we present a framework for estimating the energy consumption of distributed software systems implemented in Java. Our primary objective in devising the framework is to enable an engineer to make informed decisions when adapting a system’s architectur
作者: 憤怒事實(shí)    時(shí)間: 2025-3-23 15:53
Multiple-Choice-Fragen mit L?sungenapproach not only helps to significantly reduce the effort of system construction, but it also provides a bridge over the gap between requirements and implementation of systems. However, the existing synthesis techniques only focus on generating (global or local) state machines from scenario-based s
作者: IDEAS    時(shí)間: 2025-3-23 21:28
https://doi.org/10.1007/978-3-658-28955-3onent-based software systems. Unfortunately, the underlying formalisms suffer from . when constructing new specifications for composite components or systems and may therefore render the application of these techniques impractical for real-world applications. In this paper, we explore the . techniqu
作者: IRS    時(shí)間: 2025-3-23 23:29
https://doi.org/10.1007/978-3-658-28955-3pe (.). Models of these systems are parametrised by the number of user components and thus potentially infinite. Model checking techniques can be used to verify only specific instances of the systems. This paper presents an algorithmic technique for verification of safety interaction properties of C
作者: 圍巾    時(shí)間: 2025-3-24 04:21

作者: MOTTO    時(shí)間: 2025-3-24 09:27

作者: 等待    時(shí)間: 2025-3-24 11:23

作者: endoscopy    時(shí)間: 2025-3-24 16:41
Datengewinnung und Auswahlverfahrenronment. With the introduction of nodes sporting actuators, Wireless Sensor Networks (WSNs) are being used for realising such applications. Sensor and actuator nodes are capable of interact locally. As a result, the logic that coordinates the activities of the different nodes towards a common goals
作者: Nomadic    時(shí)間: 2025-3-24 20:09
https://doi.org/10.1007/978-3-642-17846-7e for self-adaptation is the increasing heterogeneity of applications and services, integrating multiple systems implemented in different platform and language technologies. In order to cope with this heterogeneity, self-adaptive systems need to support the integration of various technologies, allow
作者: triptans    時(shí)間: 2025-3-25 01:35
Datengewinnung und Auswahlverfahrenly growing. OSGi specific problems make it harder to validate such components. The absence of separate object spaces to isolate components may lead to inconsistencies when they are stopped. The platform cannot ensure that objects from a stopped component will no longer be referenced by active code (
作者: Ischemia    時(shí)間: 2025-3-25 03:33

作者: Throttle    時(shí)間: 2025-3-25 09:10
Die Vereinfachung der Ergebuisse,nt, and runtime. Therefore, reasoning techniques for component-based models (e.g., protocol checking, QoS predictions, etc.) are often limited to a particular life-cycle stage. We propose modelling software components in different design stages, after implemenatation, and during deployment. Abstract
作者: 雕鏤    時(shí)間: 2025-3-25 14:46
https://doi.org/10.1007/978-3-662-10034-9refore, the main development effort is required in selection of the components that fit the specific needs of an application. In this article, we propose a mechanism allowing the automatic selection of a component among a set of candidate COTS, according to functional and non-functional properties.
作者: 先鋒派    時(shí)間: 2025-3-25 17:52
,Die Logik des statistischen Schlie?ens,an facilitate the modelling process. The Reference nets are extended so that each task in the model is parameterised with a time value, representing the execution time of the task. We propose several timing profiles: those obtained from real measurement of the workflow system, from stochastic and co
作者: atrophy    時(shí)間: 2025-3-25 23:19
Udo Kuckartz,Stefan R?diker,Julia Schehlexperimental setting, with the resulting models having comparable prediction accuracy. Therefore, in some cases, the creation of reusable prediction models can already be justified, if they are reused at least once.
作者: 空氣    時(shí)間: 2025-3-26 02:13

作者: BLUSH    時(shí)間: 2025-3-26 06:57

作者: iodides    時(shí)間: 2025-3-26 09:50
Univariate H?ufigkeitsverteilungene maintained when components are integrated, in three representative component models. This enables focusing on testing the right aspects of the software at the right level of integration, and achieves cost reduction during testing — one of the most resource-consuming activities in software engineer
作者: 變白    時(shí)間: 2025-3-26 15:54

作者: 誘使    時(shí)間: 2025-3-26 20:28
https://doi.org/10.1007/978-3-642-17846-7aptation frameworks the adaptation framework of . is able to exploit a wide range of adaptation mechanisms and technologies, without modification to the adaptation framework itself. As a demonstration of this property of ., we describe the integration of an advanced component model technology, the .
作者: 腐敗    時(shí)間: 2025-3-26 21:21

作者: conscience    時(shí)間: 2025-3-27 01:30
Michel R. V. Chaudron,Clemens Szyperski,Ralf Reuss
作者: EWER    時(shí)間: 2025-3-27 05:30
Automating Performance Analysis from Taverna Workflowsan facilitate the modelling process. The Reference nets are extended so that each task in the model is parameterised with a time value, representing the execution time of the task. We propose several timing profiles: those obtained from real measurement of the workflow system, from stochastic and co
作者: 責(zé)任    時(shí)間: 2025-3-27 11:58

作者: insomnia    時(shí)間: 2025-3-27 13:44
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platformsidentiality security properties, and denial-of-service. It provides a matching between the vulnerability categories and their consequences. The exploitability of each vulnerability is validated through the development of a pair of malicious and vulnerable components. Experiments are conducted in the
作者: 天氣    時(shí)間: 2025-3-27 18:29

作者: 可商量    時(shí)間: 2025-3-27 23:33
Structural Testing of Component-Based Systemse maintained when components are integrated, in three representative component models. This enables focusing on testing the right aspects of the software at the right level of integration, and achieves cost reduction during testing — one of the most resource-consuming activities in software engineer
作者: Alveoli    時(shí)間: 2025-3-28 05:34
ESCAPE: A Component-Based Policy Framework for Sense and React Applicationssed of a Publish/Subscribe Broker, a component-based service layer and a Policy Manager. The broker manages subscriptions information and the service layer provides mechanisms orthogonal to publish/subscribe core (e.g., diffusion protocols, data communication protocols, data encryption, etc.). The n
作者: 脊椎動(dòng)物    時(shí)間: 2025-3-28 08:28
Experiences from Developing a Component Technology Agnostic Adaptation Frameworkaptation frameworks the adaptation framework of . is able to exploit a wide range of adaptation mechanisms and technologies, without modification to the adaptation framework itself. As a demonstration of this property of ., we describe the integration of an advanced component model technology, the .
作者: cajole    時(shí)間: 2025-3-28 12:48

作者: 原始    時(shí)間: 2025-3-28 17:40
Automating Performance Analysis from Taverna Workflowsized within such systems, such as the use of design patterns to support composition, and the use of a software engineering lifecycle to support workflow construction and execution. As components used within a workflow may be implemented by third parties, it is often necessary to be able to determine
作者: CLIFF    時(shí)間: 2025-3-28 21:42

作者: 乳汁    時(shí)間: 2025-3-29 00:30
Deploying Software Components for Performancector architecture on performance is well appreciated and modeled, the impact of component deployment has not been studied much. For a given component and connector architecture, the system performance is also affected by how components are deployed onto hardware resources. In this work we first form
作者: Mendicant    時(shí)間: 2025-3-29 07:08
Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Modelsonent services. However, these execution durations are specific for an execution platform (i.e. its resources such as CPU) and for a usage profile. Reusing an existing component on different execution platforms up to now required repeated measurements of the concerned components for each relevant co
作者: 盤(pán)旋    時(shí)間: 2025-3-29 07:38

作者: 核心    時(shí)間: 2025-3-29 15:20

作者: Limousine    時(shí)間: 2025-3-29 16:45

作者: Firefly    時(shí)間: 2025-3-29 22:18

作者: homeostasis    時(shí)間: 2025-3-30 02:22

作者: 疏遠(yuǎn)天際    時(shí)間: 2025-3-30 07:55

作者: 外露    時(shí)間: 2025-3-30 11:14
Automatic Protocol Conformance Checking of Recursive and Parallel Component-Based Systemstial systems can be checked. Parallel systems can be described often by well known Petri nets, but it is not possible to model recursive behaviour. On the other hand sequential systems based on pushdown automata can capture recursion and recursive callbacks [27], but they do not provide parallel beh
作者: Heart-Attack    時(shí)間: 2025-3-30 12:41

作者: 變化    時(shí)間: 2025-3-30 19:47
Towards Component-Based Design and Verification of a ,-Controllerquality of software systems. Although the idea of assembling systems from pre-fabricated components is appealing, quality becomes a major issue, especially for embedded systems. Quality defects in one component might not affect the quality of the component but that of others. This paper presents an
作者: 情感脆弱    時(shí)間: 2025-3-30 21:56

作者: countenance    時(shí)間: 2025-3-31 02:14
Experiences from Developing a Component Technology Agnostic Adaptation Frameworke for self-adaptation is the increasing heterogeneity of applications and services, integrating multiple systems implemented in different platform and language technologies. In order to cope with this heterogeneity, self-adaptive systems need to support the integration of various technologies, allow
作者: Pulmonary-Veins    時(shí)間: 2025-3-31 07:23
A Practical Approach for Finding Stale References in a Dynamic Service Platformly growing. OSGi specific problems make it harder to validate such components. The absence of separate object spaces to isolate components may lead to inconsistencies when they are stopped. The platform cannot ensure that objects from a stopped component will no longer be referenced by active code (
作者: shrill    時(shí)間: 2025-3-31 12:01

作者: Iniquitous    時(shí)間: 2025-3-31 17:13
Life-Cycle Aware Modelling of Software Componentsnt, and runtime. Therefore, reasoning techniques for component-based models (e.g., protocol checking, QoS predictions, etc.) are often limited to a particular life-cycle stage. We propose modelling software components in different design stages, after implemenatation, and during deployment. Abstract
作者: 細(xì)菌等    時(shí)間: 2025-3-31 20:03
A Component Selection Framework for COTS Librariesrefore, the main development effort is required in selection of the components that fit the specific needs of an application. In this article, we propose a mechanism allowing the automatic selection of a component among a set of candidate COTS, according to functional and non-functional properties.
作者: neologism    時(shí)間: 2025-3-31 22:07
Life-Cycle Aware Modelling of Software Components models for newly designed components can be combined with refined models for already implemented components. As a proof-of-concept, we have implemented the new modelling techniques as part of our Palladio Component Model (PCM).




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
辽宁省| 盖州市| 华宁县| 淮阳县| 澜沧| 堆龙德庆县| 五河县| 永安市| 汉沽区| 嵊州市| 会泽县| 杭锦旗| 宾川县| 交城县| 灵璧县| 青海省| 齐齐哈尔市| 贞丰县| 岳阳县| 潍坊市| 株洲县| 万荣县| 六盘水市| 茂名市| 阿克苏市| 丰顺县| 安宁市| 长武县| 新竹县| 梅河口市| 蕉岭县| 保山市| 韶山市| 麻江县| 德令哈市| 左云县| 密山市| 上高县| 修武县| 钟山县| 内江市|