Software patterns and requirements engineering activities in real-world settings: A systematic mapping study

JL Barros-Justo, FBV Benitti, AL Cravero-Leal - Computer Standards & …, 2018 - Elsevier
Context: The use of software patterns has been investigated extensively in the last decades.
Unfortunately, scarce evidence exists about the application of software patterns at the early …

Classification and comparison of architecture evolution reuse knowledge—a systematic review

A Ahmad, P Jamshidi, C Pahl - Journal of Software: Evolution …, 2014 - Wiley Online Library
Context Architecture‐centric software evolution (ACSE) enables changes in system's
structure and behaviour while maintaining a global view of the software to address evolution …

Foundations for streaming model transformations by complex event processing

I Dávid, I Ráth, D Varró - Software & Systems Modeling, 2018 - Springer
Streaming model transformations represent a novel class of transformations to manipulate
models whose elements are continuously produced or modified in high volume and with …

Approaches for managing virtual instance data

G Klompje, M Daniel - US Patent 9,417,897, 2016 - Google Patents
A resource provider is able to manage instance data associated with virtual compute
instances running in the resource provider environment. For example, when provisioning a …

Approaches for managing virtual instance data

G Klompje, M Daniel - US Patent 10,372,475, 2019 - Google Patents
A resource provider is able to manage instance data associated with virtual compute
instances running in the resource provider environment. For example, when provisioning a …

Service evolution patterns

S Wang, WA Higashino, M Hayes… - … Conference on Web …, 2014 - ieeexplore.ieee.org
Service evolution is the process of maintaining and evolving existing Web services to cater
for new requirements and technological changes. In this paper, a service evolution model is …

Streaming model transformations by complex event processing

I Dávid, I Ráth, D Varró - … , MODELS 2014, Valencia, Spain, September 28 …, 2014 - Springer
Streaming model transformations represent a novel class of transformations dealing with
models whose elements are continuously produced or modified by a background process …

How to select a security requirements method? a comparative study with students and practitioners

F Massacci, F Paci - Nordic Conference on Secure IT Systems, 2012 - Springer
Abstract Most Secure Development Software Life Cycles (SSDLCs) start from security
requirements. Security Management standards do likewise. There are several methods from …

Evolution of security engineering artifacts: a state of the art survey

M Felderer, B Katt, P Kalb, J Jürjens… - Transportation …, 2015 - igi-global.com
Security is an important quality aspect of modern open software systems. However, it is
challenging to keep such systems secure because of evolution. Security evolution can only …

Functional decomposition for software architecture evolution

D Faitelson, R Heinrich, S Tyszberowicz - Model-Driven Engineering and …, 2018 - Springer
Software systems need to evolve continuously in order to avoid becoming less useful.
However, repeated changes in the software may impede the inner quality of the system …