Sciweavers

597 search results - page 54 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
KDD
2012
ACM
222views Data Mining» more  KDD 2012»
11 years 10 months ago
Rise and fall patterns of information diffusion: model and implications
The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of ...
Yasuko Matsubara, Yasushi Sakurai, B. Aditya Praka...
OOPSLA
2007
Springer
14 years 1 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
HOTSWUP
2009
ACM
14 years 11 days ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
ISARCS
2010
141views Hardware» more  ISARCS 2010»
13 years 11 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
IEEEARES
2006
IEEE
14 years 1 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner