Software Product Lines

2023-12-07T13:39:56+00:00

One of the major technical innovations in Software Product Lines is the use of features to distinguish members of product lines. Feature models define the characteristics and the usability constraints in families of products. Current methods organize these characteristics in a tree, or a feature diagram, which is used to declaratively specify the members of [...]

Model Synchronization

2023-12-07T13:39:38+00:00

In systems and software engineering, focus is attached to architectural design activities, so as to reduce efforts and risks before system development. Engineering processes and techniques have evolved to meet these new requirements. Indeed, working at the system architecture levels requires a close collaboration between domain experts, with different languages ​​and practices, and therefore, there is a [...]

Architecture Viewpoints

2023-12-07T13:40:07+00:00

In the area of system engineering, working at the architecture level requires close cross-discipline collaboration with different languages and practices. System architecture description involves domain experts with their own concerns and rationale. The organization of architecture descriptions into views using viewpoints provides a mechanism for the separation of concerns among the stakeholders, while still providing the view [...]

Online Education for K-12

2023-12-07T13:34:08+00:00

Software is becoming a critical layer of all our lives; it is the language of the world. In the future, not knowing the language of computers will be as challenging as being illiterate or innumerate today. Computational thinking in particular is how software engineers solve problems, it combines mathematics, logics and algorithms, and teaches [...]

Cyber Security

2023-12-07T13:40:13+00:00

When securing organization’s interconnected IT infrastructure, there is a lot of rules and configuration parameters to set by security teams, and these configurations are often done manually. The security features obviously increases as time goes by, and become quickly unmanageable. Moreover, a security policy to implement isn't that complex and long if it was writen out in [...]