Ultra-Large-Scale Systems: The Software Challenge of the Future
暂无分享,去创建一个
Douglas C. Schmidt | Mark Klein | Rick Kazman | John B. Goodenough | Linda M. Northrop | Peter H. Feiler | Richard C. Linger | Thomas A. Longstaff | Richard P. Gabriel | Linda Northrop | Kevin Sullivan | Kurt C. Wallnau | T. Longstaff | D. Schmidt | J. Goodenough | M. Klein | R. Gabriel | R. Linger | P. Feiler | R. Kazman | K. Wallnau | L. Northrop | K. Sullivan | D. Schmidt
[1] Kim B. Clark,et al. Design Rules: The Power of Modularity , 2000 .
[2] Martin C. Rinard,et al. Automatic detection and repair of errors in data structures , 2003, OOPSLA '03.
[3] E. L. Nichols,et al. Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems , 2002 .
[4] Christian Blum,et al. Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.
[5] George Candea,et al. Recursive restartability: turning the reboot sledgehammer into a scalpel , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[6] David E. Kieras,et al. Towards a Practical GOMS Model Methodology for User Interface Design , 1988 .
[7] George Candea,et al. Recovery-oriented computing: building multitier dependability , 2004, Computer.
[8] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[9] Barry Boehm,et al. Software economics: a roadmap , 2000, ICSE '00.
[10] Noah Treuhaft,et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .
[11] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[12] Somesh Jha,et al. Software Design as an Investment Activity: A Real Options Perspective , 1998 .
[13] K. Kyamakya,et al. Security and survivability of distributed systems: an overview , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[14] Yuanyuan Song,et al. Modular software design with crosscutting interfaces , 2006, IEEE Software.
[15] John R. Koza,et al. Genetic Programming IV: Routine Human-Competitive Machine Intelligence , 2003 .
[16] Beverly M. Huey,et al. Human Performance Models for Computer-Aided Engineering , 1990 .
[17] F. Schneider. Trust in Cyberspace , 1998 .
[18] Allen Newell,et al. The psychology of human-computer interaction , 1983 .
[19] P. Nordin. Genetic Programming III - Darwinian Invention and Problem Solving , 1999 .
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[21] Yossi Sheffi,et al. The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage , 2005 .
[22] William G. Griswold,et al. The structure and value of modularity in software design , 2001, ESEC/FSE-9.
[23] Manuel López-Ibáñez,et al. Ant colony optimization , 2010, GECCO '10.
[24] H. Rittel,et al. Dilemmas in a general theory of planning , 1973 .
[25] Martin C. Rinard,et al. Exploring the acceptability envelope , 2005, OOPSLA '05.
[26] Joan V. Robinson,et al. The Nature of the Firm , 2004 .
[27] John R. Koza,et al. Genetic programming 2 - automatic discovery of reusable programs , 1994, Complex Adaptive Systems.
[28] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[29] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.