Current and emerging topics in software architecture (ECSA 2010 Workshops Summary)
暂无分享,去创建一个
[1] Matthias Galster. Describing variability in service-oriented software product lines , 2010, ECSA '10.
[2] James D. Herbsleb,et al. Architecting in software ecosystems: interface translucence as an enabler for scalable collaboration , 2010, ECSA '10.
[3] Arne-Kristian Groven,et al. Security measurements within the framework of quality assessment models for free/libre open source software , 2010, ECSA '10.
[4] Stefan Biffl,et al. Software ecosystems vs. natural ecosystems: learning from the ingenious mind of nature , 2010, ECSA '10.
[5] Rich Hilliard. On representing variation , 2010, ECSA '10.
[6] Ivan Porres,et al. Modeling a composite RESTful web service with UML , 2010, ECSA '10.
[7] Andrew Wang,et al. On the effectiveness of the metamorphic shield , 2010, ECSA '10.
[8] Habtamu Abie,et al. Applicability of security metrics for adaptive security management in a universal banking hub system , 2010, ECSA '10.
[9] Mario Piattini,et al. A comparison of software design security metrics , 2010, ECSA '10.
[10] Mikko Särelä,et al. Risk analysis of host identity protocol: using risk Identification Method based on Value Chain Dynamics Toolkit , 2010, ECSA '10.
[11] Barry P. Mulcahy,et al. Trust-terms ontology for defining security requirements and metrics , 2010, ECSA '10.
[12] Borislava I. Simidchieva,et al. Categorizing and modeling variation in families of systems: a position paper , 2010, ECSA '10.
[13] Harald Störrle,et al. Model driven development of user interface prototypes: an integrated approach , 2010, ECSA '10.
[14] Miroslaw Staron,et al. Characterizing model usage in embedded software engineering: a case study , 2010, ECSA '10.
[15] Slinger Jansen,et al. Increasing software product reusability and variability using active components: a software product line infrastructure , 2010, ECSA '10.
[16] Jari Peltonen,et al. From a freeform graphics tool to a repository based modeling tool , 2010, ECSA '10.
[17] Andreas Prinz,et al. Specification of modelling languages in a flexible meta-model architecture , 2010, ECSA '10.
[18] Fatma Krichen,et al. Model-based engineering for dynamic reconfiguration in DRTES , 2010, ECSA '10.
[19] Christian Jung,et al. Indicator-based architecture-level security evaluation in a service-oriented environment , 2010, ECSA '10.
[20] Slinger Jansen,et al. Software ecosystems: a software ecosystem strategy assessment model , 2010, ECSA '10.
[21] Luiz Fernando Capretz,et al. Integrating recommender information in social ecosystems decisions , 2010, ECSA '10.
[22] Moussa Ouedraogo,et al. Towards an abstraction layer for security assurance measurements: (invited paper) , 2010, ECSA '10.
[23] Faheem Ahmed,et al. A three-dimensional view of software ecosystems , 2010, ECSA '10.
[24] Rodrigo Pereira dos Santos,et al. Revisiting the concept of components in software engineering from a software ecosystem perspective , 2010, ECSA '10.
[25] Jan Bosch,et al. Architecture challenges for software ecosystems , 2010, ECSA '10.
[26] Fabio Martinelli,et al. Formal approach to security metrics.: what does "more secure" mean for you? , 2010, ECSA '10.
[27] Jesper Andersson,et al. On the role of software process modeling in software ecosystem design , 2010, ECSA '10.
[28] Kimmo Hätönen,et al. Towards holistic security management through coherent measuring , 2010, ECSA '10.
[29] Pim van den Broek,et al. A model for variability design rationale in SPL , 2010, ECSA '10.
[30] Jani Suomalainen,et al. Secure information sharing between heterogeneous embedded devices , 2010, ECSA '10.
[31] Antti Evesti,et al. Towards micro architecture for security adaptation , 2010, ECSA '10.
[32] Slinger Jansen,et al. Evaluating architectural openness in mobile software platforms , 2010, ECSA '10.
[33] Dominik Seichter,et al. Knowledge management in software ecosystems: software artefacts as first-class citizens , 2010, ECSA '10.
[34] John D. McGregor. A method for analyzing software product line ecosystems , 2010, ECSA '10.
[35] Harald Störrle. Towards clone detection in UML domain models , 2010, ECSA '10.
[36] Muhammad Ali Babar,et al. Modeling security for service oriented applications , 2010, ECSA '10.