找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Component-Based Software Engineering; 11th International S Michel R. V. Chaudron,Clemens Szyperski,Ralf Reuss Conference proceedings 2008 S

[复制链接]
查看: 42964|回复: 59
发表于 2025-3-21 16:57:39 | 显示全部楼层 |阅读模式
书目名称Component-Based Software Engineering
副标题11th International S
编辑Michel R. V. Chaudron,Clemens Szyperski,Ralf Reuss
视频videohttp://file.papertrans.cn/232/231790/231790.mp4
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Component-Based Software Engineering; 11th International S Michel R. V. Chaudron,Clemens Szyperski,Ralf Reuss Conference proceedings 2008 S
描述On behalf of the Organizing Committee we are pleased to present the p- ceedings of the 2008 Symposium on Component-Based Software Engineering (CBSE). CBSE is concerned with the development of software-intensivesystems from independently developed software-building blocks (components), the - velopment of components, and system maintenance and improvement by means of component replacement and customization. CBSE 2008 was the 11th in a series of events that promote a science and technology foundation for achieving predictable quality in software systems through the use of software component technology and its associated software engineering practices. Wewerefortunateto haveadedicatedProgramCommitteecomprisingmany internationallyrecognizedresearchersandindustrialpractitioners.Wewouldlike to thank the members of the Program Committee and associated reviewers for their contribution in making this conference a success. We received 70 subm- sions and each paper was reviewed by at least three Program Committee m- bers (four for papers with an author on the Program Committee). The entire reviewing process was supported by the Conference Management Toolkit p- vided by Microsoft. In total, 20
出版日期Conference proceedings 2008
关键词component models; component-based systems; design; model-driven development; real-time information syste
版次1
doihttps://doi.org/10.1007/978-3-540-87891-9
isbn_softcover978-3-540-87890-2
isbn_ebook978-3-540-87891-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2008
The information of publication is updating

书目名称Component-Based Software Engineering影响因子(影响力)




书目名称Component-Based Software Engineering影响因子(影响力)学科排名




书目名称Component-Based Software Engineering网络公开度




书目名称Component-Based Software Engineering网络公开度学科排名




书目名称Component-Based Software Engineering被引频次




书目名称Component-Based Software Engineering被引频次学科排名




书目名称Component-Based Software Engineering年度引用




书目名称Component-Based Software Engineering年度引用学科排名




书目名称Component-Based Software Engineering读者反馈




书目名称Component-Based Software Engineering读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:32:22 | 显示全部楼层
发表于 2025-3-22 01:08:03 | 显示全部楼层
发表于 2025-3-22 05:38:14 | 显示全部楼层
Component-Based Software Engineering978-3-540-87891-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-22 12:48:20 | 显示全部楼层
发表于 2025-3-22 13:26:04 | 显示全部楼层
发表于 2025-3-22 17:31:43 | 显示全部楼层
发表于 2025-3-22 22:19:09 | 显示全部楼层
Hans-Joachim Mittag,Katharina Schülleronent services. However, these execution durations are specific for an execution platform (i.e. its resources such as CPU) and for a usage profile. Reusing an existing component on different execution platforms up to now required repeated measurements of the concerned components for each relevant co
发表于 2025-3-23 05:24:19 | 显示全部楼层
Statistik, Daten und statistische Methodenas those compliant to J2EE, a usual way to enforce access control is to define Access Control Configurations (ACCs) for components in a declarative manner. These ACCs can be enforced by the J2EE security service to grant or deny access requests to components. However, it is difficult for the develop
发表于 2025-3-23 05:32:43 | 显示全部楼层
https://doi.org/10.1007/978-3-658-28955-3olution makes a set of Java vulnerabilities directly exploitable by malicious code: access to classes in multi-component platforms, and access to object in SOP, is granted to them with often no control..This paper defines two taxonomies that characterize vulnerabilities in Java components: the vulne
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 01:13
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表