Component-based software design model

被引:0
|
作者
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:451 / 454
相关论文
共 50 条
  • [21] A component-based model integrated framework for embedded software
    Chen, WZ
    Xie, C
    Shi, JY
    [J]. EMBEDDED SOFTWARE AND SYSTEMS, 2005, 3605 : 563 - 569
  • [22] A dynamic business model for component-based simulation software
    Onggo, Stephan
    Soopramanien, Didier
    Pidd, Mike
    [J]. PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 954 - +
  • [23] Umbrella: A New Component-Based Software Development Model
    Dixit, Anurag
    Saxena, P. C.
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 62 - 67
  • [24] A Formal Model for Component-Based Embedded Software Development
    Li, Changde
    Zhou, Xingshe
    Dong, Yunwei
    Yu, Zhiwen
    [J]. 2009 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, : 19 - 23
  • [25] A graph-based model for component-based software development
    Sedigh-Ali, S
    Ghafoor, A
    [J]. WORDS 2005: 10TH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE, PROCEEDINGS, 2005, : 254 - 259
  • [26] EX-MAN Component Model for Component-Based Software Construction
    Tauseef Rana
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 2915 - 2928
  • [27] On the Evolution of Component-Based Software
    Cote, Isabelle
    Heisel, Maritta
    Souquieres, Jeanine
    [J]. ADVANCES IN SOFTWARE ENGINEERING TECHNIQUES, 2012, 7054 : 54 - +
  • [28] A component-based software process
    Capretz, LF
    [J]. OOIS 2001: 7TH INTERNATIONAL CONFERENCE ON OBJECT-ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 523 - 529
  • [29] Component-based software development
    Capretz, LF
    Capretz, MAM
    Li, DH
    [J]. IECON'01: 27TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2001, : 1834 - 1837
  • [30] Component-Based Software Development
    Sharma, Virendra Kumar
    Gupta, Narendra Prakash
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 132 - 134