نتایج جستجو برای: profile software
تعداد نتایج: 649666 فیلتر نتایج به سال:
UMLsec is a UML profile for designing and modeling security aspects of the software systems. It can be integrated into existing software development processes with minimal changes to them, and its application does not require special training in cryptography and related fields. This way the UMLsec methodology aims to increase the quality of security-critical systems development. This paper pres...
A design pattern describes a general solution to a design problem that recurs repeatedly in many projects. Software designers adapt the pattern solution to their specific project. Design patterns are usually modeled using UML. However, UML does not keep track of pattern-related information when a design pattern is applied or composed with other patterns. Thus, it is hard for a designer to ident...
Previous modular protocol design and implementation allow a flexible configuration and reconfiguration of protocol layers or full protocol stacks. However, in our days, software engineering technologies introduce new methods for designing and specifying modular software. Such a technology is the component-based software technology. Using those techniques, a software system could be modular. Thi...
It is not an overstatement to say that the gap between software design and performance evaluation techniques has caused the misuse of the last ones by software engineers. The UML profile for schedulability, performance and time [13] arose from the intention to close both fields, software engineering and performance analysis. Nevertheless the gap remains, since it is difficult for software engin...
In this paper we propose a UML profile that extends the Unified Modeling Language (UML) to support the development of safety-critical embedded software in accordance with the safety standard IEC 61508 [5]. Our profile enables software developers to precisely express certification-related information using the UML notation. This improved information density in software models can be exploited as...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید