Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Atsuto Kubo"'
Publikováno v:
Journal of Software Engineering and Applications. :983-998
Detecting well-known design patterns in object-oriented program source code can help maintainers understand the design of a program. Through the detection, the understandability, maintainability, and reusability of object-oriented programs can be imp
Publikováno v:
ITCC (2)
Scopus-Elsevier
Scopus-Elsevier
In software development, many kinds of knowledge are shared and reused as software patterns. However, the relation analysis among software patterns by hand is difficult on the large scale. In this paper, we propose a technique for the automatic relat
Publikováno v:
Proceedings of the 2nd Asian Conference on Pattern Languages of Programs.
Design patterns are known for their usefulness to solve recurrent problems. Design patterns are a way of transmitting knowledge and experience by using proven, high quality solutions.A problem that emerges when using design patterns is that it is not
Autor:
Hironori Washizaki, Charles B. Haley, Haruhiko Kaiya, Armstrong Nhlabatsi, Nobukazu Yoshioka, Bashar Nuseibeh, Arosha K. Bandara, Robin Laney, Shinpei Hayashi, Jan Jürjens, Thein Than Tun, Yijun Yu, Atsuto Kubo, Haralambos Mouratidis
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security pattern
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b400dafae162467a9ff04dbc338b1933
https://doi.org/10.4018/978-1-61520-837-1.ch004
https://doi.org/10.4018/978-1-61520-837-1.ch004
Publikováno v:
ARES
The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts’ knowledge. Security patterns contain typical solutions about s
Publikováno v:
Advances in Software Engineering ISBN: 9783642175770
FGIT-ASEA
FGIT-ASEA
Among several diagrams defined in UML, the class diagram is particularly useful through entire software development process, from early domain analysis stages to later maintenance stages. However conventional UML environments are often inappropriate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4bdd5d77a247d123dc42d8bf4e5ef623
https://doi.org/10.1007/978-3-642-17578-7_29
https://doi.org/10.1007/978-3-642-17578-7_29
Autor:
Atsuto Kubo, Toshihiro Kodaka, Nobukazu Yoshioka, Kazuki Eguchi, Hironori Washizaki, Hideyuki Kanuka, Yoshiaki Fukazawa, Tomohiko Mizumachi, Yoichi Nagai, Nobuhide Sugimoto, Rieko Yamamoto
Publikováno v:
Proceedings of the 8th workshop on Aspects, components, and patterns for infrastructure software.
JavaScript is a popular scripting language that is particularly useful for client-side programming together with HTML /XML on the Web. As JavaScript programs become more complex and large, separation of concerns at the implementation level is a signi
Publikováno v:
ACIS-ICIS
Detecting design patterns from object-oriented program source-code can help maintainers understand the design of the program. However, the detection precision of conventional approaches based on the structural aspects of patterns is low due to the fa
Publikováno v:
DEXA Workshops
There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs of security patterns are not enough because the designer does not know when and where to apply them, especially in a larg
Publikováno v:
Progress in WWW Research and Development ISBN: 9783540788485
APWeb
APWeb
Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a128f04ee69c39ad06eb966a11d1b0b
https://doi.org/10.1007/978-3-540-78849-2_35
https://doi.org/10.1007/978-3-540-78849-2_35