2011 18th Asia-Pacific Software Engineering Conference 2011
DOI: 10.1109/apsec.2011.53
|View full text |Cite
|
Sign up to set email alerts
|

Aspects and Annotations for Controlling the Roles Application Classes Play for Design Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…For the future work we are developing a modular [9], [10], [11], [4], [33] custom analyser based on swarm intelligence approaches [25], [36] that can process a huge amount of data [19], [27], [30] by offloading to cloud resources [35], [3] the computational demand. For further works will be explored solutions based also on alternative approaches such as flexible neuro-fuzzy models [6], self organizing maps, UCT-based [39] and statistical decision threes based [31] approaches.…”
Section: Discussionmentioning
confidence: 99%
“…For the future work we are developing a modular [9], [10], [11], [4], [33] custom analyser based on swarm intelligence approaches [25], [36] that can process a huge amount of data [19], [27], [30] by offloading to cloud resources [35], [3] the computational demand. For further works will be explored solutions based also on alternative approaches such as flexible neuro-fuzzy models [6], self organizing maps, UCT-based [39] and statistical decision threes based [31] approaches.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed approach can be easily embedded on a P2P BitTorrent system, while preserving modularity and separation of concerns (Bannò et al, 2010;Giunta et al, 2011;Calvagna and Tramontana, 2013;Tramontana, 2013), since the computational cost due to prediction and modelling is essentially up to the tracker itself, hence freeing peers of the burden. This choice would tap into a resource, the tracker, which is an existing component that peers have to connect to.…”
Section: Discussionmentioning
confidence: 99%
“…[35,7,20,24,27,37,5,28], and assisting in the identification of configuration errors [2,26,23,31,13,14,4].…”
Section: Related Workmentioning
confidence: 99%