1 |
F.P. Brooks. The Mythical Man-Month: Essays on software engineering, Anniversary Edition. Addison-Wesely, 1999
|
2 |
D'souza D.F. and Wills A.C., Objects, Components, and Components with UML, Addison-Wisely, 1998
|
3 |
John Cheesman, and John Daniels. 'UML Components,' Pearson Education: Addison-Wesley, 2000
|
4 |
Urs Holzle. 'Integration Independently-Developed Components In Object-Oriented Languages,' Proceedings of ECOOP'93, Springer Verlag LNCS 512, 1993
|
5 |
Jim Q, Ning, 'Component-Based Software Engineering,' IEEE Software, 1997
|
6 |
Jan Bosch, Superimposition: A Component Adaptation Technique, Information and Software Technology, 41(5): 257-272, March, 1999
DOI
ScienceOn
|
7 |
Uwe Zdun, Markus Volter, Michael Kircher: Pattern-Based Design of an Asynchronous Invocation Framework for Web Services. Int. J. Web Service Res. 1(3): 42-62 (2004)
DOI
|
8 |
Uwe Zdun, Markus Viilter, Michael Kircher: Design and Implementation of an Asynchronous Invocation Framework for Web Services. ICWS-Europe 2003: 64-78
|
9 |
Nierstrasz Oscar, Meijler Theo Dirk, 'Research Directions in Software Composition,' ACM Computing Surveys, Vo1.27, No.2, pp.262-264, June, 1995
DOI
|
10 |
M. Adams, J. Coplien, R. Gamoke, R Hanmer, F. Keeve, and K. Nicodemus,' Fault-Tolerant Telecommunication System Patterns,' Proc. Secon Conf, Pattern Language of Program, Sept. 1995
|
11 |
S. Robertson, 'Requirements Patterns via Events/ Use Cases,' 1996, http://www.systernsguild.com/GuildSite/SQR/Requirements_Patterns.html
|
12 |
W. Keller, 'Object/Relational Access Layers- A Roadmap, Missing Links and More Patterns.' Proc. EuroPLoP 1998 Conf, July 1998
|
13 |
A.Dardenne, Avan Lamsweerde, and S. Fickas, 'Goal-Directed Requirements Acquisition,' Selected Papers Sixth Int'l Workshop Software Specification and Design, pp.3-50, 1993
DOI
ScienceOn
|
14 |
M. Shaw, 'Some Patterns for Software Architectures,' Pattern Languages of Program Design Vol.2, pp.255-269, 1996
|
15 |
H.Gomaa, Designing Concurrent, Distributed, and Real-Time Application with UML, Addison-Wesley, 2000
|
16 |
A.G. Sutcliffe, N.A. Maiden, S. Minocha, and D. Manuel, 'Supporting Scenario-Based Requirements Engineering,' Software Eng., Vol. 24, No. 12, pp. 1072-1088, Dec. 1998
DOI
ScienceOn
|
17 |
S.Konrad, Betty H.C. Cheng, Laura A, Campbell, 'Object Analysis Patterns for Embedded Systems,' IEEE Transaction on software engineering, Vo1.30, No.l2, December 2004
DOI
ScienceOn
|
18 |
D.Gross and E.S.K. Yu, 'From Non-Functional Requirements to Design through Patterns,' Requirements Eng., Vo1.6, No.1, pp.18-36, 2001
DOI
|
19 |
E. Gamma, R. Helm, R Johnson, J. Vlissides,' Design Patterns: Elements of Reusable ObjectOriented Software,' Addison-Wesley, 1995
|
20 |
M. Fowler, Analysis Patterns: Reusable Object Models. Addison-Wesley, 1997
|
21 |
E.B. Fernandez and X. Yuan, 'Semantic Analysis Patterns,' Proc. 19th Int'l Conf, Conceptual Modeling(ER 2000), pp.183-195, 2000
|
22 |
A. Geyer-Schutz and M Hashler, 'Software Engineering with Analysis Patterns,' 2001,http://wwwai. wu-wien.ac.at/~hahsler/research
|
23 |
C.D. Sigwart, G.L.V. Meer, and J.C. Hansen, Software Engineering: A project oriented Approach. J. Leisy Jr., Franlin, Beedle, and Assoc., 1990
|
24 |
S. Konard, B.H.C. Cheng, L.A. Campbell, and R. Wassermann, 'Using Security Patterns to Model and Analyze Security Requirements,' Proc. Requirements for High Assurance Systems Workshop (RHAS '3), Sept. 2002
|
25 |
L.A. Campbell, 'Enabling Integrative Analyses and Refinement of Object-Oriented Models with Special Emphasis on High-Assurance Embedded Systems,' PhD thesis, Michigan State Univ., East Lansing, 2004
|